Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 547062, 27 pages
http://dx.doi.org/10.1155/2014/547062
Review Article

A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

1Centre for Mobile Cloud Computing Research (C4MCCR), Faculty of Computer Science and Information Technology, University of Malaya, 50603 Lembah Pantai, Kuala Lumpur, Malaysia
2University of Malaya, 50603 Lembah Pantai, Kuala Lumpur, Malaysia

Received 14 March 2014; Accepted 27 May 2014; Published 6 July 2014

Academic Editor: Fei Yu

Copyright © 2014 Suleman Khan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Shiraz, A. Gani, R. H. Khokhar, and R. Buyya, “A review on distributed application processing frameworks in smart mobile devices for mobile cloud computing,” IEEE Communications Surveys and Tutorials, vol. 15, no. 3, pp. 1294–1313, 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. M. Shiraz and A. Gani, “A lightweight active service migration framework for computational offloading in mobile cloud computing,” The Journal of Supercomputing, vol. 68, no. 2, pp. 978–995, 2013. View at Google Scholar
  3. A. Tzanakaki, M. Anastasopoulos, G. S. Zervas, B. R. Rofoee, R. Nejabati, and D. Simeonidou, “Virtualization of heterogeneous wireless-optical network and IT infrastructures in support of cloud and mobile cloud services,” IEEE Communications Magazine, vol. 51, no. 8, pp. 155–161, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Karim, S. A. A. Shah, and R. Salleh, “Mobile botnet attacks: a thematic taxonomy,” in New Perspectives in Information Systems and Technologies, vol. 2, pp. 153–164, Springer, Berlin, Germany, 2014. View at Google Scholar
  5. A. Karim, R. B. Salleh, M. Shiraz, S. A. A. Shah, I. Awan, and N. B. Anuar, “Botnet detection techniques: review, future trends and issues,” Journal of Zhejiang University SCIENCE C. In press.
  6. H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of mobile cloud computing: architecture, applications, and approaches,” Wireless Communications and Mobile Computing, vol. 13, no. 18, pp. 1587–1611, 2013. View at Publisher · View at Google Scholar · View at Scopus
  7. S. Hansman and R. Hunt, “A taxonomy of network and computer attacks,” Computers and Security, vol. 24, no. 1, pp. 31–43, 2005. View at Publisher · View at Google Scholar · View at Scopus
  8. E. Jeong and B. Lee, “An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole router and data mining based on network forensics against network attacks,” Future Generation Computer Systems, vol. 33, pp. 42–52, 2014. View at Publisher · View at Google Scholar
  9. Y. Fen, Z. Hui, C. Shuang-Shuang, and Y. Xin-Chun, “A lightweight IP traceback scheme depending on TTL,” Procedia Engineering, vol. 29, pp. 1932–1937, 2012. View at Publisher · View at Google Scholar
  10. A. C. Kim, W. H. Park, and D. H. Lee, “A study on the live forensic techniques for anomaly detection in user terminals,” International Journal of Security and Its Applications, vol. 7, no. 1, pp. 181–188, 2013. View at Google Scholar · View at Scopus
  11. R. Bejtlich, The Practice of Network Security Monitoring: Understanding Incident Detection and Response, No Starch Press, 2013.
  12. S. Gupta, P. Kumar, and A. Abraham, “A profile based network intrusion detection and prevention system for securing cloud environment,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 364575, 12 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  13. S. Zawoad and R. Hasan, “Cloud forensics: a meta-study of challenges, approaches, and open problems,” http://arxiv.org/abs/1302.6312.
  14. K. Ruan, J. Carthy, T. Kechadi, and I. Baggili, “Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results,” Digital Investigation, vol. 10, no. 1, pp. 34–43, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. Y. Wang, Z. Liu, Z. Du, and Y. Huang, “Mobile cloud computing network attack and defense learning system based on fuzzy soft sets,” Procedia Computer Science, vol. 17, pp. 214–221, 2013. View at Publisher · View at Google Scholar
  16. L. M. Chen, M. C. Chen, W. Liao, and Y. S. Sun, “A scalable network forensics mechanism for stealthy self-propagating attacks,” Computer Communications, vol. 36, no. 13, pp. 1471–1484, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Wang, Z. Zhang, and Y. Kadobayashi, “Exploring attack graph for cost-benefit security hardening: a probabilistic approach,” Computers and Security, vol. 32, pp. 158–169, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. D. Wang, T. Li, S. Liu, J. Zhang, and C. Liu, “Dynamical network forensics based on immune agent,” in Proceedings of the 3rd International Conference on Natural Computation (ICNC '07), vol. 3, pp. 651–656, IEEE, Haikou, China, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  19. B.-G. Chun and P. Maniatis, “Augmented smartphone applications through clone cloud execution,” in Proceedings of the 12th Conference on Hot Topics in Operating Systems (HotOS '09), pp. 8–11, USENIX Association, Berkeley, Calif, USA, 2009.
  20. M. Satyanarayanan, P. Bahl, R. Cáceres, and N. Davies, “The case for VM-based cloudlets in mobile computing,” IEEE Pervasive Computing, vol. 8, no. 4, pp. 14–23, 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Dou, V. Kalogeraki, D. Gunopulos, T. Mielikainen, and V. H. Tuulos, “Misco: a MapReduce framework for mobile systems,” in Proceedings of the 3rd International Conference on PErvasive Technologies Related to Assistive Environments (PETRA '10), p. 32, ACM, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, “CloneCloud: elastic execution between mobile device and cloud,” in Proceedings of the 6th ACM EuroSys Conference on Computer Systems (EuroSys '11), pp. 301–314, ACM, April 2011. View at Publisher · View at Google Scholar · View at Scopus
  23. H. Qi, M. Shiraz, A. Gani, M. Whaiduzzaman, and S. Khan, “Sierpinski triangle based data center architecture in cloud computing,” The Journal of Supercomputing, pp. 1–21, 2014. View at Publisher · View at Google Scholar
  24. A. Beloglazov, J. Abawajy, and R. Buyya, “Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing,” Future Generation Computer Systems, vol. 28, no. 5, pp. 755–768, 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, “A survey on vehicular cloud computing,” Journal of Network and Computer Applications, vol. 40, pp. 325–344, 2014. View at Google Scholar
  26. N. Sandlin, “Pay as you go,” Planning, vol. 55, no. 7, pp. 18–22, 1989. View at Google Scholar · View at Scopus
  27. Amazon Web Services, “Amazon S3,” 2014, http://aws.amazon.com/s3.
  28. D. Houston, “Drop Box,” 2014, http://www.dropbox.com/.
  29. Google, “Google Drive,” 2014, https://drive.google.com/.
  30. Google, “Google Docs,” 2014, https://docs.google.com/.
  31. M. Benioff, “Sales Force,” 2014, http://www.salesforce.com/.
  32. S. Funke, S. Laue, Z. Lotker, and R. Naujoks, “Power assignment problems in wireless communication: covering points by disks, reaching few receivers quickly, and energy-efficient travelling salesman tours,” Ad Hoc Networks, vol. 9, no. 6, pp. 1028–1035, 2011. View at Publisher · View at Google Scholar
  33. A. A. Abbasi and M. Younis, “A survey on clustering algorithms for wireless sensor networks,” Computer Communications, vol. 30, no. 14-15, pp. 2826–2841, 2007. View at Publisher · View at Google Scholar · View at Scopus
  34. W. Yue, K. Miyazaki, and X. Deng, “Optimal channel assignment in wireless communication networks with distance and frequency interferences,” Computer Communications, vol. 27, no. 16, pp. 1661–1669, 2004. View at Publisher · View at Google Scholar · View at Scopus
  35. G. Sharma, S. Bala, and A. K. Verma, “Security frameworks for wireless sensor networks-review,” Procedia Technology, vol. 6, pp. 978–987, 2012. View at Publisher · View at Google Scholar
  36. B. Schneier, Secrets and Lies: Digital Security in a Networked World, John Wiley & Sons, 2011.
  37. A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, “A survey of mobile malware in the wild,” in Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11), pp. 3–14, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  38. E. Casey, Handbook of Digital Forensics and Investigation, Elsevier, 2009.
  39. I. Ray and N. Poolsapassit, “Using attack trees to identify malicious attacks from authorized insiders,” in Computer Security—ESORICS 2005, pp. 231–246, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar
  40. G. Palmer, “A road map for digital forensic research,” in Proceedings of the 1st Digital Forensic Research Workshop, pp. 27–30, Utica, NY, USA.
  41. M. Reith, C. Carr, and G. Gunsch, “An examination of digital forensic models,” International Journal of Digital Evidence, vol. 1, no. 3, pp. 1–12, 2002. View at Google Scholar
  42. B. Carrier and E. H. Spafford, “Getting physical with the digital investigation process,” International Journal of Digital Evidence, vol. 2, no. 2, pp. 1–20, 2003. View at Google Scholar
  43. B. Carrier and E. H. Spafford, “An event-based digital forensic investigation framework,” in Digital Forensic Research Workshop, 2004. View at Google Scholar
  44. N. L. Beebe and J. G. Clark, “A hierarchical, objectives-based framework for the digital investigations process,” Digital Investigation, vol. 2, no. 2, pp. 147–167, 2005. View at Publisher · View at Google Scholar · View at Scopus
  45. P. Stavroulakis and M. Stamp, Handbook of Information and Communication Security, Springer, Heidelberg, Germany, 2010.
  46. M. Pollitt, “Computer forensics: an approach to evidence in cyberspace,” in Proceedings of the National Information Systems Security Conference, pp. 487–491, 1995.
  47. A. Valjarevic and H. S. Venter, “Harmonised digital forensic investigation process model,” in Proceedings of the Conference on Information Security for South Africa (ISSA '12), pp. 1–10, IEEE, Johannesburg, South Africa, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  48. K. Kent, S. Chevalier, T. Grance, and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, National Institute of Standards and Technology (NIST), 2006.
  49. J. Cosic and M. Baca, “Do we have full control over integrity in digital evidence life cycle?” in Proceedings of the 32nd International Conference on Information Technology Interfaces (ITI '10), pp. 429–434, IEEE, June 2010. View at Scopus
  50. Guidance Software, “Encase,” 2014, http://www.guidancesoftware.com/.
  51. Access Data, “Forensics Toolkit,” 2014, http://www.accessdata.com/products/digital-forensics/ftk.
  52. B. Carrier, “The Sleuth Kit,” 2014, http://www.sleuthkit.org/index.php.
  53. e-fense Carpe Datum, “Helix,” 2014, http://www.e-fense.com/index.php.
  54. C. Boyd and P. Forster, “Time and date issues in forensic computing—a case study,” Digital Investigation, vol. 1, no. 1, pp. 18–23, 2004. View at Publisher · View at Google Scholar · View at Scopus
  55. B. Carrier, File System Forensic Analysis, Addison-Wesley, Boston, Mass, USA, 2005.
  56. W. Dou, Q. Chen, and J. Chen, “A confidence-based filtering method for DDoS attack defense in cloud environment,” Future Generation Computer Systems, vol. 29, no. 7, pp. 1838–1850, 2013. View at Publisher · View at Google Scholar · View at Scopus
  57. S. Mizoguchi, K. Takemori, Y. Miyake, Y. Hori, and K. Sakurai, “Traceback framework against botmaster by sharing network communication pattern information,” in Proceedings of the 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS '11), pp. 639–644, July 2011. View at Publisher · View at Google Scholar · View at Scopus
  58. K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, “Cloud forensics: an overview,” in Proceedings of the IFIP International Conference on Digital Forensics, vol. 7, 2011.
  59. R. W. Ritchey and P. Ammann, “Using model checking to analyze network vulnerabilities,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 156–165, IEEE, May 2000. View at Scopus
  60. N. Kumar and S. Sharma, “Study of intrusion detection system for DDoS attacks in cloud computing,” in Proceedings of the 10th International Conference on Wireless and Optical Communications Networks (WOCN '13), pp. 1–5, Bhopal, India, 2013. View at Publisher · View at Google Scholar
  61. P. Casas, J. Mazel, and P. Owezarski, “Steps towards autonomous network security: unsupervised detection of network attacks,” in Proceedings of the 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS '11), pp. 1–5, Paris, France, February 2011. View at Publisher · View at Google Scholar · View at Scopus
  62. M. Ibrahim, M. T. Abdullah, and A. Dehghantanha, “VoIP evidence model: a new forensic method for investigating VoIP malicious attacks,” in Proceedings of the International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec '12), pp. 201–206, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  63. Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, “Enabling public verifiability and data dynamics for storage security in cloud computing,” in Computer Security—ESORICS 2009, pp. 355–370, Springer, New York, NY, USA, 2009. View at Google Scholar
  64. E. Chan, S. Venkataraman, F. David, A. Chaugule, and R. Campbell, “Forenscope: a framework for live forensics,” in Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10), pp. 307–316, December 2010. View at Publisher · View at Google Scholar · View at Scopus
  65. S. Sitaraman and S. Venkatesan, “Computer and network forensics,” in Digital Crime and Forensic Science in Cyberspace, P. Kanellis and E. Kiountouzis, Eds., chapter 3, pp. 55–74, Idea Group Publishing, 2006. View at Google Scholar
  66. A. Balasubramanian, R. Mahajan, and A. Venkataramani, “Augmenting mobile 3G using WiFi,” in Proceedings of the 8th Annual International Conference on Mobile Systems, Applications and Services (MobiSys '10), pp. 209–222, ACM, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  67. K. Asatani, “Carrier-grade networks toward the future—NGN and its issues,” in Green Communication and Networking, vol. 113 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 1–15, Springer, New York, NY, USA, 2013. View at Google Scholar
  68. B.-S. P. Lin, W.-H. Tsai, C. C. Wu, P. H. Hsu, J. Y. Huang, and T.-H. Liu, “The design of cloud-based 4G/LTE for mobile augmented reality with smart mobile devices,” in Proceedings of the IEEE 7th International Symposium on Service-Oriented System Engineering (SOSE '13), pp. 561–566, Redwood City, Calif, USA, March 2013. View at Publisher · View at Google Scholar · View at Scopus
  69. S. Yoo, “Intra- and inter-data center networking architectures for future cloud computing,” in Proceedings of the Asia Communications and Photonics Conference (ACP '12), p. 1, IEEE, Guangzhou, China, 2012.
  70. M. Mechtri, I. Houidi, W. Louati, and D. Zeghlache, “SDN for inter cloud networking,” in Proceedings of the IEEE SDN for Future Networks and Services (SDN4FNS '13), pp. 1–7, IEEE, Trento, Italy, November 2013. View at Publisher · View at Google Scholar
  71. H. S. Kim and H. K. Kim, “Network forensic evidence acquisition (NFEA) with packet marking,” in Proceedings of the 9th IEEE International Symposium on Parallel and Distributed Processing with Applications Workshops (ISPAW '11), pp. 388–393, Busan, Republic of Korea, May 2011. View at Publisher · View at Google Scholar · View at Scopus
  72. H. Suo, Z. Liu, J. Wan, and K. Zhou, “Security and privacy in mobile cloud computing,” in Proceedings of the 9th International Wireless Communications and Mobile Computing Conference (IWCMC '13), pp. 655–659. View at Publisher · View at Google Scholar
  73. H. Guo, B. Jin, and T. Shang, “Forensic investigations in cloud environments,” in Proceedings of the International Conference on Computer Science and Information Processing (CSIP '12), pp. 248–251, IEEE, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  74. D. Birk, “Technical challenges of forensic investigations in cloud computing environments,” in Proceedings of the Workshop on Cryptography and Security in Clouds, pp. 1–6, 2011.
  75. G. Grispos, T. Storer, and W. B. Glisson, “Calm before the storm: the challenges of cloud computing in digital forensics,” Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, vol. 4, no. 2, pp. 28–48, 2011. View at Publisher · View at Google Scholar · View at Scopus
  76. M. Shiraz, E. Ahmed, A. Gani, and Q. Han, “Investigation on runtime partitioning of elastic mobile applications for mobile cloud computing,” The Journal of Supercomputing, vol. 67, no. 1, pp. 84–103, 2014. View at Publisher · View at Google Scholar · View at Scopus
  77. D. Kliazovich, P. Bouvry, and S. U. Khan, “DENS: data center energy-efficient network-aware scheduling,” Cluster Computing, vol. 16, no. 1, pp. 65–75, 2013. View at Publisher · View at Google Scholar · View at Scopus
  78. K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, “Cloud forensics,” in Advances in Digital Forensics VII, pp. 35–46, Springer, 2011. View at Google Scholar
  79. D. Reilly, C. Wren, and T. Berry, “Cloud computing: pros and cons for computer forensic investigations,” International Journal Multimedia and Image Processing, vol. 1, pp. 26–34, 2011. View at Google Scholar
  80. J. Dykstra and A. T. Sherman, “Understanding issues in cloud forensics: two hypothetical case studies,” in Proceedings of the Conference on Digital Forensics Security and Law (ADFSL '11), pp. 191–206, 2011.
  81. T. Mather, S. Kumaraswamy, and S. Latif, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance, O'Reilly, 2009.
  82. S. Zawoad and R. Hasan, “I have the proof: providing proofs of past data possession in cloud forensics,” in Proceedings of the ASE International Conference on Cyber Security (CyberSecurity '12), pp. 75–82, Alexandria, Va, USA, December 2012.
  83. S. D. Wolthusen, “Overcast: forensic discovery in cloud environments,” in Proceedings of the 5th International Conference on IT Security Incident Management and IT Forensics (IMF '09), pp. 3–9, IEEE, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  84. M. Taylor, J. Haggerty, D. Gresty, and R. Hegarty, “Digital evidence in cloud computing systems,” Computer Law & Security Review, vol. 26, no. 3, pp. 304–308, 2010. View at Publisher · View at Google Scholar · View at Scopus
  85. W. Yu, X. Fu, E. Blasch et al., “On effectiveness of hopping-based spread spectrum techniques for network forensic traceback,” in Proceedings of the 14th IEEE ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD '13), pp. 101–106, 2013.
  86. T. Akyuz and I. Sogukpinar, “Packet marking with distance based probabilities for IP traceback,” in Proceedings of the 1st International Conference on Networks and Communications (NetCoM '09), pp. 433–438, IEEE, Chennai, India, December 2009. View at Publisher · View at Google Scholar · View at Scopus
  87. J. C. Pelaez and E. B. Fernandez, “VoIP network forensic patterns,” in Proceedings of the 4th International Multi-Conference on Computing in the Global Information Technology (ICCGI '09), pp. 175–180, IEEE, August 2009. View at Publisher · View at Google Scholar · View at Scopus
  88. I.-L. Lin, Y.-S. Yen, B.-L. Wu, and H.-Y. Wang, “VoIP network forensic analysis with digital evidence procedure,” in Proceedings of the 6th International Conference on Networked Computing and Advanced Information Management (NCM '10), pp. 236–241, IEEE, August 2010. View at Scopus
  89. P. Park, Voice over IP Security, Pearson Education, 2008.
  90. H.-M. Hsu, Y. S. Sun, and M. C. Chen, “A collaborative forensics framework for VoIP services in multi-network environments,” in Intelligence and Security Informatics, pp. 260–271, Springer, 2008. View at Google Scholar
  91. B. K. Sy, “Integrating intrusion alert information to aid forensic explanation: an analytical intrusion detection framework for distributive IDS,” Information Fusion, vol. 10, no. 4, pp. 325–341, 2009. View at Publisher · View at Google Scholar · View at Scopus
  92. L. Chen, Z. Li, C. Gao, and Y. Liu, “Modeling and analyzing dynamic forensics system based on intrusion tolerance,” in Proceedings of the IEEE 9th International Conference on Computer and Information Technology (CIT '09), pp. 230–235, October 2009. View at Publisher · View at Google Scholar · View at Scopus
  93. Y.-T. Fan and S.-J. Wang, “Intrusion investigations with data-hiding for computer log-file forensics,” in Proceedings of the 5th International Conference on Future Information Technology (FutureTech '10), pp. 1–6, IEEE, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  94. L. Jiang, G. Tian, and S. Zhu, “Design and implementation of network forensic system based on intrusion detection analysis,” in Proceedings of the International Conference on Control Engineering and Communication Technology (ICCECT '12), pp. 689–692, Liaoning, China, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  95. M. Albanese, S. Jajodia, A. Pugliese, and V. Subrahmanian, “Scalable analysis of attack scenarios,” in Computer Security—ESORICS 2011, vol. 6879 of Lecture Notes in Computer Science, pp. 416–433, Springer, New York, NY, USA, 2011. View at Publisher · View at Google Scholar
  96. Y. Fen, Y. Xinchun, and H. Hao, “An network attack modeling method based on MLL-AT,” Physics Procedia C, vol. 24, pp. 1765–1772, 2012. View at Publisher · View at Google Scholar
  97. C. Liu, A. Singhal, and D. Wijesekera, “Using attack graphs in forensic examinations,” in Proceedings of the 7th International Conference on Availability, Reliability and Security (ARES '12), pp. 596–603, IEEE, Prague, Czech Republic, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  98. A. Diamah, M. Mohammadian, and B. M. Balachandran, “Network security evaluation method via attack graphs and fuzzy cognitive maps,” in Intelligent Decision Technologies, pp. 433–440, Springer, 2012. View at Google Scholar
  99. Z. Harbort, G. Louthan, and J. Hale, “Techniques for attack graph visualization and interaction,” in Proceedings of the 7th Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11), p. 74, ACM, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  100. K. Shanmugasundaram, N. Memon, A. Savant, and H. Bronnimann, “ForNet: a distributed forensics network,” in Computer Network Security, pp. 1–16, Springer, 2003. View at Google Scholar
  101. W. Ren and H. Jin, “Distributed agent-based real time network intrusion forensics system architecture design,” in Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA '05), pp. 177–182, IEEE, March 2005. View at Publisher · View at Google Scholar · View at Scopus
  102. W. Ren, “On a reference model of distributed cooperative network, forensics system,” in Proceedings of the 6th International Conference on Information Integrationand Web-Based Applications Services (iiWAS '04), 2004. View at Google Scholar
  103. D. Zissis and D. Lekkas, “Addressing cloud computing security issues,” Future Generation Computer Systems, vol. 28, no. 3, pp. 583–592, 2012. View at Publisher · View at Google Scholar · View at Scopus
  104. B. Stephens, A. L. Cox, S. Rixner, and T. S. E. Ng, “A scalability study of enterprise network architectures,” in Proceedings of the 7th ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '11), pp. 111–121, Brooklyn, NY, USA, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  105. M. Michael, J. E. Moreira, D. Shiloach, and R. W. Wisniewski, “Scale-up x scale-out: a case study using nutch/Lucene,” in Proceedings of the 21st International Parallel and Distributed Processing Symposium (IPDPS '07), pp. 1–8, IEEE, Long Beach, Calif, USA, March 2007. View at Publisher · View at Google Scholar · View at Scopus
  106. L. M. Vaquero, L. Rodero-Merino, and R. Buyya, “Dynamically scaling applications in the cloud,” ACM SIGCOMM Computer Communication Review, vol. 41, no. 1, pp. 45–52, 2011. View at Publisher · View at Google Scholar
  107. Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya, “Heterogeneity in mobile cloud computing: taxonomy and open challenges,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 369–392, 2014. View at Publisher · View at Google Scholar · View at Scopus
  108. N. Fernando, S. W. Loke, and W. Rahayu, “Mobile cloud computing: a survey,” Future Generation Computer Systems, vol. 29, no. 1, pp. 84–106, 2013. View at Publisher · View at Google Scholar · View at Scopus
  109. B. Claise, “Cisco systems NetFlow services export version 9,” 2004.
  110. A. Gani, G. M. Nayeem, M. Shiraz, M. Sookhak, M. Whaiduzzaman, and S. Khan, “A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing,” Journal of Network and Computer Applications, vol. 43, pp. 84–102, 2014. View at Publisher · View at Google Scholar
  111. E. S. Pilli, R. C. Joshi, and R. Niyogi, “Network forensic frameworks: survey and research challenges,” Digital Investigation, vol. 7, no. 1-2, pp. 14–27, 2010. View at Publisher · View at Google Scholar · View at Scopus
  112. Y. Zhang, N. Meratnia, and P. J. M. Havinga, “Distributed online outlier detection in wireless sensor networks using ellipsoidal support vector machine,” Ad Hoc Networks, vol. 11, no. 3, pp. 1062–1074, 2013. View at Publisher · View at Google Scholar · View at Scopus
  113. S. Pushp, T. H. Cho, J. Han, D. Lee, J. Song, and S. Choi, “An efficient way to track peers in mobile P2P network,” in Proceedings of the 18th Annual International Conference on Mobile Computing and Networking (MobiCom '12), pp. 431–434, ACM, August 2012. View at Publisher · View at Google Scholar · View at Scopus
  114. N. Liao, S. Tian, and T. Wang, “Network forensics based on fuzzy logic and expert system,” Computer Communications, vol. 32, no. 17, pp. 1881–1892, 2009. View at Publisher · View at Google Scholar · View at Scopus
  115. B. Cusack and M. Alqahtani, Acquisition of Evidence from Network Intrusion Detection Systems, 2013.
  116. L. Slusky, P. Partow-Navid, and M. Doshi, “Cloud computing and computer forensics for business applications,” Journal of Technology Research, vol. 3, p. 1, 2012. View at Google Scholar
  117. R. G. Clegg, M. S. Withall, A. W. Moore et al., “Challenges in the capture and dissemination of measurements from high-speed networks,” IET Communications, vol. 3, no. 6, pp. 957–966, 2009. View at Publisher · View at Google Scholar · View at Scopus
  118. G. Chockler, D. Dobre, and A. Shraer, “Brief announcement: consistency and complexity tradeoffs for highly-available multi-cloud store,” in Proceedings of the the International Symposium on Distributed Computing (DISC '13), 2013.
  119. L. Zhou, K. He, X. Sheng, and B. Wang, “A survey of data management system for cloud computing: models and searching methods,” Research Journal of Applied Sciences, Engineering and Technology, vol. 6, no. 2, pp. 244–248, 2013. View at Google Scholar · View at Scopus
  120. J. Xu, Y. Yu, Z. Chen et al., “MobSafe: cloud computing based forensic analysis for massive mobile applications using data mining,” Tsinghua Science and Technology, vol. 18, no. 4, 2013. View at Publisher · View at Google Scholar
  121. I. Sadeh, S. Kitanov, and D. Davcev, “Application of multiple description coding for adaptive QoS mechanism for mobile cloud computing,” International Journal of Cloud Computing and Services Science, vol. 2, no. 6, 2014. View at Publisher · View at Google Scholar
  122. Y. Lin, Y. Yen, and P. Wu, “Primary research on VoIP security threat vulnerability and attack prevention,” in ISMAD, 2009. View at Google Scholar
  123. D. S. Chan, T. Berger, and L. Tong, “Carrier sense multiple access communications on multipacket reception channels: theory and applications to IEEE 802.11 wireless networks,” IEEE Transactions on Communications, vol. 61, no. 1, pp. 266–278, 2013. View at Publisher · View at Google Scholar · View at Scopus
  124. L. Lei, Z. Zhong, K. Zheng, J. Chen, and H. Meng, “Challenges on wireless heterogeneous networks for mobile cloud computing,” IEEE Wireless Communications, vol. 20, no. 3, pp. 34–44, 2013. View at Publisher · View at Google Scholar
  125. X. Wu, K. N. Brown, and C. J. Sreenan, “Analysis of smartphone user mobility traces for opportunistic data collection in wireless sensor networks,” Pervasive and Mobile Computing, vol. 9, pp. 881–891, 2013. View at Publisher · View at Google Scholar · View at Scopus
  126. N. Chilamkurti, S. Zeadally, and H. Chaouchi, Next-Generation Wireless Technologies: 4G and Beyond, Springer, London, UK, 2013. View at Publisher · View at Google Scholar
  127. A. Lee and T. Brewer, “Guidelines for smart grid cyber security: vol. 1, smart grid cyber security strategy, architecture, and high-level requirements,” NISTIR, 2010.
  128. J. Dykstra and A. T. Sherman, “Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques,” Digital Investigation, vol. 9, pp. S90–S98, 2012. View at Publisher · View at Google Scholar · View at Scopus
  129. M. Afanasyev, T. Kohno, J. Ma et al., “Privacy-preserving network forensics,” Communications of the ACM, vol. 54, no. 5, pp. 78–87, 2011. View at Publisher · View at Google Scholar · View at Scopus
  130. A. Waqar, A. Raza, H. Abbas, and M. K. Khan, “A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 235–248, 2013. View at Publisher · View at Google Scholar · View at Scopus