[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

A review of mobile forensic investigation process models

A Al-Dhaqm, S Abd Razak, RA Ikuesan… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …

A multifaceted framework for adoption of cloud computing in Malaysian SMEs

A Asiaei, NZ Ab. Rahim - Journal of Science and Technology Policy …, 2019 - emerald.com
Purpose The purpose of this study is to develop a model to understand the relationships
among technology, organizational and environmental (TOE) contexts, intention to adopt …

A systematic survey on cloud forensics challenges, solutions, and future directions

B Manral, G Somani, KKR Choo, M Conti… - ACM Computing …, 2019 - dl.acm.org
The challenges of cloud forensics have been well-documented by both researchers and
government agencies (eg, US National Institute of Standards and Technology), although …

Research challenges and opportunities in drone forensics models

A Al-Dhaqm, RA Ikuesan, VR Kebande, S Razak… - Electronics, 2021 - mdpi.com
The emergence of unmanned aerial vehicles (also referred to as drones) has transformed
the digital landscape of surveillance and supply chain logistics, especially in terrains where …

[HTML][HTML] Interpol review of digital evidence 2016-2019

P Reedy - Forensic Science International: Synergy, 2020 - Elsevier
This review paper covers the forensic-relevant literature in digital evidence from 2016 to
2019 as a part of the 19th Interpol International Forensic Science Managers Symposium …

Proactive forensics in IoT: Privacy-aware log-preservation architecture in fog-enabled-cloud using holochain and containerization technologies

K Janjua, MA Shah, A Almogren, HA Khattak, C Maple… - Electronics, 2020 - mdpi.com
Collecting and preserving the smart environment logs connected to cloud storage is
challenging due to the black-box nature and the multi-tenant cloud models which can …

[HTML][HTML] Holistic digital forensic readiness framework for IoT-enabled organizations

VR Kebande, PP Mudau, RA Ikuesan, HS Venter… - Forensic Science …, 2020 - Elsevier
Abstract Internet of Things (IoT) are becoming commonplace in homes, buildings, cities, and
nations, and IoT networks are also getting more complex and interconnected. The …

Towards the development of an integrated incident response model for database forensic investigation field

A Al-Dhaqm, S Abd Razak, K Siddique… - IEEE …, 2020 - ieeexplore.ieee.org
For every contact that is made in a database, a digital trace will potentially be left and most of
the database breaches are mostly aimed at defeating the major security goals …

Real-time monitoring as a supplementary security component of vigilantism in modern network environments

VR Kebande, NM Karie, RA Ikuesan - International Journal of Information …, 2021 - Springer
The phenomenon of network vigilantism is autonomously attributed to how anomalies and
obscure activities from adversaries can be tracked in real-time. Needless to say, in today's …