Abstract
In this position paper, the authors present some of the concerns with respect to monitoring and managing the behavioral trust of participants in a forensic cloud data center environment. The basic idea of the approach is to view the interaction process of collaborating forensic cloud data centers overseeing an existing investigation or a set of such investigations across distinct jurisdictions. This work is an important first step to support the need for enabling trustable cloud digital investigations among participating law enforcement agencies.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Mell, P., Grance, T.: NIST Definition of Cloud Computing, http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf (retrieved from: September 2009)
Casey, E.: Digital Evidence and Computer Crime, 2nd edn. Academic Press, San Diego (2004)
Papalilo, E., Friese, T., Smith, M., Freisleben, B.: Trust Shaping: Adapting Trust Establishment and Management to Application Requirements in a Service-Oriented Grid Environment. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 47–58. Springer, Heidelberg (2005)
GridSim, http://www.gridbus.org/gridsim
Foster, I., Kesselman, C.: The Grid2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann (2004)
Ali, A.S., Rana, O., Walker, D.W.: WS-QoC: Measuring Quality of Service Compliance. In: Proceeding of the Second International Conference on Service-Oriented Computing Short Papers (ICSOC), New York, USA, pp. 16–25 (2004)
Lindstrom, P.: Attacking and Defending Web Service (2004), http://www.forumsystems.com/papers/AttackingandDefending_WS.pdf
De Roure, D., Jennings, N., Shadbolt, N.: Research Agenda for the Semantic Grid: A Future E-Science Infrastructure (2001), http://www.semanticgrid.org/v1.9/semgrid.pdf
Foster, I., Kishimoto, H., Savva, A., Berry, D., Djaoui, A., Grimshaw, A., Horn, B., Maciel, F., Siebenlist, F., Subramaniam, R., Treadwell, J., Von Reich, J.: The Open Grid Services Architecture (2005), http://www.gridforum.org/documents/GWD-I-E/GFDI.030.pdf
Papalilo, E., Freisleben, B.: Combining Incomparable Public Session Keys and Certificateless Public Key Cryptography for Securing the Communication Between Grid Participants. In: Meersman, R., Tari, Z. (eds.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1264–1279. Springer, Heidelberg (2007)
Thorpe, S.: Modeling Trust in a Cloud Computing Context. In: Proceedings of the ACM CIKM/PIKM (October 2010)
Thorpe, S., Ray, I.: Detecting Temporal Inconsistency in Virtual Machine Activity Timelines. Proceedings of Journal of Information Assurance and Security (JIAS)Â 7(1) (May 2012)
Thorpe, S., Ray, I.: File Timestamps in a Cloud Digital Investigation. Journal of Information Assurance and Security 6(2), 495–502 (2011) ISSN1554-1010
Grandison, T., Sloman, M.: A survey of trust in Internet applications. IEEE Communications Surveys& Tutorials 3(4) (2000)
Riley, D., Wren, C., Berry, T.: Cloud Forensic Challenges for Law Enforcement proceedings. In: Proceedings of the International Conference for Internet Technology and Secured Transactions, London, UK (November 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Thorpe, S., Grandison, T., Ray, I., Barbir, A. (2012). Towards Enabling Behavioral Trust among Participating Cloud Forensic Data Center Agencies. In: Jonker, W., Petković, M. (eds) Secure Data Management. SDM 2012. Lecture Notes in Computer Science, vol 7482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32873-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-32873-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32872-5
Online ISBN: 978-3-642-32873-2
eBook Packages: Computer ScienceComputer Science (R0)