0% found this document useful (0 votes)
10 views115 pages

Enterprise Security Second International Workshop ES 2015 Vancouver BC Canada November 30 December 3 2015 Revised Selected Papers 1st Edition Victor Chang Digital Version 2025

The document is a collection of revised selected papers from the Enterprise Security Second International Workshop held in Vancouver, Canada, from November 30 to December 3, 2015. It addresses various challenges in enterprise security, including cloud forensics, risk management, and biometric recognition, showcasing innovative methods and frameworks to enhance security practices. The book aims to provide valuable insights and research contributions to improve security measures across different organizations.

Uploaded by

martinquez2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views115 pages

Enterprise Security Second International Workshop ES 2015 Vancouver BC Canada November 30 December 3 2015 Revised Selected Papers 1st Edition Victor Chang Digital Version 2025

The document is a collection of revised selected papers from the Enterprise Security Second International Workshop held in Vancouver, Canada, from November 30 to December 3, 2015. It addresses various challenges in enterprise security, including cloud forensics, risk management, and biometric recognition, showcasing innovative methods and frameworks to enhance security practices. The book aims to provide valuable insights and research contributions to improve security measures across different organizations.

Uploaded by

martinquez2011
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 115

Enterprise Security Second International Workshop ES

2015 Vancouver BC Canada November 30 December 3 2015


Revised Selected Papers 1st Edition Victor Chang
instant download 2025

Featured on textbookfull.com
https://textbookfull.com/product/enterprise-security-second-
international-workshop-es-2015-vancouver-bc-canada-
november-30-december-3-2015-revised-selected-papers-1st-edition-
victor-chang/

★★★★★
4.7 out of 5.0 (92 reviews )

Immediate PDF Access


Enterprise Security Second International Workshop ES 2015
Vancouver BC Canada November 30 December 3 2015 Revised
Selected Papers 1st Edition Victor Chang

TEXTBOOK

Available Formats

■ PDF eBook Study Guide Ebook

EXCLUSIVE 2025 ACADEMIC EDITION – LIMITED RELEASE

Available Instantly Access Library


More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Big Data Benchmarking 6th International Workshop WBDB


2015 Toronto ON Canada June 16 17 2015 and 7th
International Workshop WBDB 2015 New Delhi India
December 14 15 2015 Revised Selected Papers 1st Edition
Tilmann Rabl
https://textbookfull.com/product/big-data-benchmarking-6th-
international-workshop-wbdb-2015-toronto-on-canada-
june-16-17-2015-and-7th-international-workshop-wbdb-2015-new-
delhi-india-december-14-15-2015-revised-selected-papers-1st-ed/

Graphical Models for Security Second International


Workshop GraMSec 2015 Verona Italy July 13 2015 Revised
Selected Papers 1st Edition Sjouke Mauw

https://textbookfull.com/product/graphical-models-for-security-
second-international-workshop-gramsec-2015-verona-italy-
july-13-2015-revised-selected-papers-1st-edition-sjouke-mauw/

Brain Inspired Computing Second International Workshop


BrainComp 2015 Cetraro Italy July 6 10 2015 Revised
Selected Papers 1st Edition Katrin Amunts

https://textbookfull.com/product/brain-inspired-computing-second-
international-workshop-braincomp-2015-cetraro-italy-
july-6-10-2015-revised-selected-papers-1st-edition-katrin-amunts/

Information and Communications Security 17th


International Conference ICICS 2015 Beijing China
December 9 11 2015 Revised Selected Papers 1st Edition
Sihan Qing
https://textbookfull.com/product/information-and-communications-
security-17th-international-conference-icics-2015-beijing-china-
december-9-11-2015-revised-selected-papers-1st-edition-sihan-
Worldwide Language Service Infrastructure Second
International Workshop WLSI 2015 Kyoto Japan January 22
23 2015 Revised Selected Papers 1st Edition Yohei
Murakami
https://textbookfull.com/product/worldwide-language-service-
infrastructure-second-international-workshop-wlsi-2015-kyoto-
japan-january-22-23-2015-revised-selected-papers-1st-edition-
yohei-murakami/

Formal Techniques for Safety Critical Systems 4th


International Workshop FTSCS 2015 Paris France November
6 7 2015 Revised Selected Papers 1st Edition Cyrille
Artho
https://textbookfull.com/product/formal-techniques-for-safety-
critical-systems-4th-international-workshop-ftscs-2015-paris-
france-november-6-7-2015-revised-selected-papers-1st-edition-
cyrille-artho/

Smart Health International Conference ICSH 2015 Phoenix


AZ USA November 17 18 2015 Revised Selected Papers 1st
Edition Xiaolong Zheng

https://textbookfull.com/product/smart-health-international-
conference-icsh-2015-phoenix-az-usa-november-17-18-2015-revised-
selected-papers-1st-edition-xiaolong-zheng/

Computer Assisted and Robotic Endoscopy Second


International Workshop CARE 2015 Held in Conjunction
with MICCAI 2015 Munich Germany October 5 2015 Revised
Selected Papers 1st Edition Xiongbiao Luo
https://textbookfull.com/product/computer-assisted-and-robotic-
endoscopy-second-international-workshop-care-2015-held-in-
conjunction-with-miccai-2015-munich-germany-
october-5-2015-revised-selected-papers-1st-edition-xiongbiao-luo/

Radio Frequency Identification and IoT Security 12th


International Workshop RFIDSec 2016 Hong Kong China
November 30 December 2 2016 Revised Selected Papers 1st
Edition Gerhard P. Hancke
https://textbookfull.com/product/radio-frequency-identification-
and-iot-security-12th-international-workshop-rfidsec-2016-hong-
kong-china-november-30-december-2-2016-revised-selected-
Victor Chang · Muthu Ramachandran
Robert J. Walters · Gary Wills (Eds.)
LNCS 10131

Enterprise Security
Second International Workshop, ES 2015
Vancouver, BC, Canada, November 30 – December 3, 2015
Revised Selected Papers

123
Lecture Notes in Computer Science 10131
Commenced Publication in 1973
Founding and Former Series Editors:
Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen

Editorial Board
David Hutchison
Lancaster University, Lancaster, UK
Takeo Kanade
Carnegie Mellon University, Pittsburgh, PA, USA
Josef Kittler
University of Surrey, Guildford, UK
Jon M. Kleinberg
Cornell University, Ithaca, NY, USA
Friedemann Mattern
ETH Zurich, Zurich, Switzerland
John C. Mitchell
Stanford University, Stanford, CA, USA
Moni Naor
Weizmann Institute of Science, Rehovot, Israel
C. Pandu Rangan
Indian Institute of Technology, Madras, India
Bernhard Steffen
TU Dortmund University, Dortmund, Germany
Demetri Terzopoulos
University of California, Los Angeles, CA, USA
Doug Tygar
University of California, Berkeley, CA, USA
Gerhard Weikum
Max Planck Institute for Informatics, Saarbrücken, Germany
More information about this series at http://www.springer.com/series/7410
Victor Chang Muthu Ramachandran

Robert J. Walters Gary Wills (Eds.)


Enterprise Security
Second International Workshop, ES 2015
Vancouver, BC, Canada, November 30 – December 3, 2015
Revised Selected Papers

123
Editors
Victor Chang Robert J. Walters
International Business School Suzhou Department of Electronics and Computer
Xi’an Jiaotong-Liverpool University Science
Suzhou University of Southampton
China Southampton
UK
Muthu Ramachandran
School of Computing, Creative Gary Wills
Technologies, and Engineering Department of Electronics and Computer
Leeds Beckett University Science
Leeds University of Southampton
UK Southampton
UK

ISSN 0302-9743 ISSN 1611-3349 (electronic)


Lecture Notes in Computer Science
ISBN 978-3-319-54379-6 ISBN 978-3-319-54380-2 (eBook)
DOI 10.1007/978-3-319-54380-2

Library of Congress Control Number: 2017934328

LNCS Sublibrary: SL4 – Security and Cryptology

© Springer International Publishing AG 2017


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now
known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

Printed on acid-free paper

This Springer imprint is published by Springer Nature


The registered company is Springer International Publishing AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

Enterprise security is an important area since all types of organizations require secure
and robust environments, platforms, and services to work with people, data, and
computing applications. There are instances where security breaches and privacy
concerns have been the main factors preventing organizations from putting their
resources in public and community domains. Even in private domains, there is no
escape from the threats to cyber security, privacy, trust, and risk. We live in an
information age whereby there is a massive and rapid dissemination of information.
Protecting our data, privacy, and rights has become increasingly important regardless
of where we are based and in which organization we work. Challenges such as data
ownership, trust, unauthorized access, and big data management should be resolved by
using innovative methods, models, frameworks, case studies, and analysis to reduce
risks imposed by data leakage, hacking, breach of privacy, and abuse of data. To adopt
the best practices, papers that can fully address security, privacy, and risk concerns are
welcome. We seek papers from both technical security (theory, prototype, experiments,
simulations, proofs-of-concept, and product development) and information system
security (review, frameworks, best practices, statistical analysis based on surveys and
recommendations) that provide good recommendations and research contributions to
enterprise security. The best papers from the ES 2015 workshop were selected for this
book. This book presents comprehensive and intensive research into various areas of
enterprise security including a chapter on “Challenges of Cloud Forensics” by Hamid
Jahankhani and Amin Hosseinian-Far, who discuss how cloud computing has gener-
ated significant interest in both academia and industry, but it is still an evolving
paradigm. Cloud computing services are also a popular target for malicious activities,
resulting in the exponential increase of cyber attacks. Digital evidence is the evidence
that is collected from the suspect’s workstations or electronic media that could be used
to assist computer forensics investigations. Cloud forensics involves digital evidence
collection in the cloud environment. The current established forensic procedures and
process models require major changes in order to be acceptable in a cloud environment.
This chapter aims to assess the challenges that forensic examiners face in tracking
down and using digital information stored in the cloud and discusses the importance of
education and training for handling, managing, and investigating computer evidence.
Similarly, a chapter on the relationship between public budgeting and risk man-
agement – competition or driving? – by Yaotai Lu discusses how the world is rife with
uncertainties. Risk management plays an increasingly important role in both the public
sector and the private sector. Considering that government is the risk manager of last
resort, government faces a vast variety of risks and disasters, either natural or man-
made. Owing to scarce public resources and increasing public needs, government is not
capable of financing all risk management programs. However, once a catastrophic
event occurs, government must take immediate actions to control the event. Another
interesting chapter on “Iris Biometrics Recognition in Security Management” by
VI Preface

Ahmad Ghaffari, Amin Hosseinian-Far, and Akbar Sheikh-Akbari discusses an


application of iris recognition for human identification, which has significant potential
for developing a robust identification system. This is due to the fact that the iris patterns
of individuals are unique, differentiable from left to right eye, and are almost stable
over the time. However, the performance of existing iris recognition systems depends
on the signal processing algorithms they use for iris segmentation, feature extraction,
and template matching. Like any other signal processing system, the performance
of the iris recognition system depends on the existing level of noise in the image and
can deteriorate as the level of noise increases.
The chapter on “Robust Enterprise Application Security with eTRON Architecture”
by M. Fahim Ferdous Khan, Ken Sakamura, and Noboru Koshizuka presents the
eTRON architecture, which aims at delineating a generic framework for developing
secure e-services. At the core of the eTRON architecture lies the tamper-resistant
eTRON chip that is equipped with functions for mutual authentication, encrypted
communication, and strong access control. Besides the security features, the eTRON
architecture also offers a wide range of functionalities through a coherent set of API
commands so that programmers can develop value-added services in a transparent
manner. This chapter discusses various features of the eTRON architecture, and pre-
sents three representative eTRON-based e-services in order to evaluate its effectiveness
by comparison with other existing e-services.
We believe the approaches discussed in this chapter will significantly impact on
industrial practice as well as research in the area of enterprise security. Enterprise
security also includes new models of cloud-based enterprises. We hope you enjoy
reading this book.

February 2017 Victor Chang


Muthu Ramachandran
Gary Wills
Robert J. Walters
Organization

Workshop Chairs

General Chair
Victor Chang Xi’an Jiaotong-Liverpool University, China

Co-chairs
Muthu Ramachandran Leeds Beckett University, UK
Gary Wills University of Southampton, UK
Robert John Walters University of Southampton, UK

Publicity Chairs
Mario Hoffmann Fraunhofer Institute for Applied and Integrated
Security (AISEC), Germany
Neil N. Yen University of Aizu, Japan
Laurence T. Yang St. Francis Xavier University, Canada
Chung-Sheng Li IBM, USA
Wendy Currie Audencia Nantes, France

Keynote Speaker

Dr. Konstantin (Kosta) Beznosov

Program Committee
Mitra Arami American University of Middle East, Kuwait
Reinhold Behringer Leeds Beckett University, UK
Victor Chang Xi’an Jiaotong-Liverpool University, China
Sidney Chapman Freelance, Australia
Tzu-chun Chen TU Darmstadt, Germany
Chung-Sheng Li IBM, USA
Muthu Ramachandran Leeds Beckett University, UK
Jose Simao Instituto Superior de Engenharia de Lisboa, Portugal
Robert John Walters University of Southampton, UK
Gary Wills University of Southampton, UK
Fara Yahya University of Southampton, UK
Contents

Challenges of Cloud Forensics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1


Hamid Jahankhani and Amin Hosseinian-Far

Could the Outsourcing of Incident Response Management Provide


a Blueprint for Managing Other Cloud Security Requirements?. . . . . . . . . . . 19
Bob Duncan, Mark Whittington, Martin Gilje Jaatun,
and Alfredo Ramiro Reyes Zúñiga

The Relationship Between Public Budgeting and Risk Management:


Competition or Driving? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Yaotai Lu

Iris Biometrics Recognition in Security Management . . . . . . . . . . . . . . . . . . 73


Ahmad Ghaffari, Amin Hosseinian-Far, and Akbar Sheikh-Akbari

Automatic Clustering of Malicious IP Flow Records


Using Unsupervised Learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Muhammad Fahad Umer and Muhammad Sher

A Hybrid Model of Attribute Aggregation in Federated Identity


Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Md. Sadek Ferdous, Farida Chowdhury, and Ron Poet

Robust Enterprise Application Security with eTRON Architecture . . . . . . . . . 155


M. Fahim Ferdous Khan, Ken Sakamura, and Noboru Koshizuka

Obfuscation and Diversification for Securing Cloud Computing . . . . . . . . . . 179


Shohreh Hosseinzadeh, Samuel Laurén, Sampsa Rauti,
Sami Hyrynsalmi, Mauro Conti, and Ville Leppänen

An Approach to Organizational Cybersecurity . . . . . . . . . . . . . . . . . . . . . . 203


Jose Romero-Mariona, Roger Hallman, Megan Kline,
Geancarlo Palavicini, Josiah Bryan, John San Miguel, Lawrence Kerr,
Maxine Major, and Jorge Alvarez

Using Goal-Question-Metric (GQM) Approach to Assess Security


in Cloud Storage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Fara Yahya, Robert J. Walters, and Gary B. Wills
X Contents

Security in Organisations: Governance, Risks and Vulnerabilities


in Moving to the Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Madini O. Alassafi, Raid K. Hussain, Ghada Ghashgari, R.J. Walters,
and G.B. Wills

Protecting Document Outside Enterprise Network:


A Confirmed Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
Zeyad S. Aaber, Gary B. Wills, and Richard M. Crowder

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277


Challenges of Cloud Forensics

Hamid Jahankhani1 and Amin Hosseinian-Far2(&)


1
Department of Digital Technology and Computing,
GSM London, London, UK
[email protected]
2
School of Computing, Creative Technologies and Engineering,
Leeds Beckett University, Leeds, UK
[email protected]

Abstract. Legal requirement for cloud forensics is currently uncertain and


presents a challenge for the legal system. These challenges arises from the fact
that cloud environment consists of distributed shared storages so there is a level
of necessary interactions forensic examiners and law enforcement officers require
from the cloud provider in order to conduct their investigations. Cloud computing
has generated significant interest in both academia and industry, but it is still an
evolving paradigm. Cloud computing services are also, a popular target for
malicious activities; resulting to the exponential increase of cyber-attacks. Digital
evidence is the evidence that is collected from the suspect’s workstations or
electronic medium that could be used in order to assist computer forensics
investigations. Cloud forensics involves digital evidence collection in the cloud
environment. The current established forensic procedures and process models
require major changes in order to be acceptable in cloud environment. This
chapter aims to assess challenges that forensic examiners face in tracking down
and using digital information stored in the cloud and discuss the importance of
education and training to handle, manage and investigate computer evidence.

Keywords: Cloud computing  Cloud forensics  Digital evidence  Cyber


security strategy  Computer misuse act  Anti-forensics  Challenges of cloud
forensics

1 Introduction

In a fully connected truly globalised world of networks, most notably the internet,
mobile technologies, distributed databases, electronic commerce and E-governance
E-crime manifests itself as Money Laundering; Intellectual Property Theft; Identity
Fraud/Theft; Unauthorised access to confidential information; Destruction of infor-
mation; Exposure to Obscene Material; Spoofing and Phishing; Viruses and Worms
and Cyber-Stalking, Economic Espionage to name a few.
According to the House of Commons, Home Affairs Committee, Fifth Report of
Session 2013–14, on E-crime, “Norton has calculated its global cost to be $388bn
dollars a year in terms of financial losses and time lost. This is significantly more than
the combined annual value of $288bn of the global black market trade in heroin,
cocaine and marijuana.” (Home Affairs Committee 2013).

© Springer International Publishing AG 2017


V. Chang et al. (Eds.): Enterprise Security, LNCS 10131, pp. 1–18, 2017.
DOI: 10.1007/978-3-319-54380-2_1
2 H. Jahankhani and A. Hosseinian-Far

Since the launch of the UK’s first Cyber Security Strategy in June 2009 and the
National Cyber Security Programme (NCSP) in November 2011, UK governments
have had a centralised approach to cybercrime and wider cyber threats.
Until recently E-crimes had to be dealt with under legal provisions meant for old
crimes such as conspiracy to commit fraud, theft, harassment and identity theft. Matters
changed slightly in 1990 when the Computer Misuse Act was passed but even then it
was far from sufficient and mainly covered crimes involving hacking.
Over the years, the exponential growth of computing era has brought to light many
technological breakthroughs. The next radical wave of this growth appeared to be
outside the traditional desktop’s realm. An evolving terminology that can describe this
paradigm is cloud computing. Smith (2011) and Martini and Choo (2012) argued that
cloud computing has recently become a prevalent technology and currently is one of
the main trends in the ICT sector. In cloud computing several tangible and intangible
objects (such as home appliances) surrounding people can be integrated in a network or
in a set of networks (Cook 2007).
Migration to cloud computing usually involves replacing much of the traditional IT
hardware found in an organisation’s data centre (such as servers and network switches)
with remote and virtualised services configured for the particular requirements of the
organisation. Hence, data comprising the organisation’s application can be physically
hosted across multiple locations, possibly with a broad geographic distribution (Grispos
et al. 2012).
As a result, the use of cloud computing can bring possible advantages to organi-
sations including increased efficiency and flexibility. For instance, virtualised and
remote services can provide greater flexibility over a physical IT infrastructure as they
can be rapidly Re-configured to meet new requirements without acquiring a new or
potentially redundant hardware (Sammons 2015). Further, Khajeh-Hosseini et al.
(2010) found that cloud computing can be a significantly cheaper alternative to pur-
chasing and maintaining system infrastructure In-house.
Though, the other side of the coin supports that cloud computing services are a
popular target for malicious activities; resulting to the exponential increase of cyber-
crimes, Cyber-Attacks (Bluementhal 2010). Consequently, this phenomenon demon-
strates the need to explore the various challenges and problems of cloud computing in
the forensics community to potentially prevent future digital fraud, espionage, Intel-
lectual Property (IP) theft as well as other types of concern.

2 Cloud Computing; Concept, Technology & Architecture

In 1980’s the main centralized processing power for various computation tasks was
through mainframes (Jadeja and Modi 2012), however this centralized public utility
architecture is gaining momentum in today’s industries and numerous applications
therein. According to (Givehchi and Jasperneite 2013) “the main goal of cloud com-
puting is to provide on-demand computing services with high scalability and avail-
ability in a distributed environment with minimum complexity for the service
consumers”. According to Chang et al. (2016a) many businesses are now considering
cloud computing as an option to reduce their costs and to enhance the efficiency in their
Challenges of Cloud Forensics 3

business processes. Cloud computing offers a variety of advantages as opposed to


non-distributed architectures. Users can access the application only using a browser,
regardless of the geographical area they reside in, and the type of system they are using.
Knowing the centralised nature of the cloud, it is an ultimate solution in disastor
recovery and and for crucial nature of business continuity (Jadeja and Modi 2012).
There are three known cloud categories; Romgovind et al. (2010) depicted these
categories in a so called ‘Cloud Computing Map’:
They also outlined three main cloud delivery models i.e. ‘Software as a Service’,
‘Platform as a Service’, and ‘Infrastructure as a Service’, in the same figure (Fig. 1). In
the SaaS delivery model, the focus is on how the user is accessing the software on a
cloud. The software is accessible by the user through his/her browser and the user
would not need to be concerns about the software deployment, installation and the
system’s resources, etc. (Kumar 2014). Instances include but not limited to Mobile
Application, Thin Clients, etc. PaaS delivery model is where the cloud provider offers
the required platform for the user in which software can be created and deployed. This
is not a single technology/platform and entails a range of different resources and
services (Devi and Ganesan 2015). Instances include but not limited to Database, Web
Server and Tools required for Development, etc. Considering the cloud architecture as
stack, Infrastructure as Service (IaaS) would be the base layer offering the full required
computing infrastructure for the above mentioned delivery models. The infrastructure
will be available and distributed through the Internet and Web; an instance include
Amazon Web Services (Alhadidi et al. 2016).

Fig. 1. Cloud computing map; adapted from (Romgovind et al. 2010)


4 H. Jahankhani and A. Hosseinian-Far

With regards to generic cloud categorisation, there are numerous definitions and
characteristics for the above-mentioned three categories. Batra and Gupta (2016) define
the categories as:
Private Cloud: In private cloud computing, cloud services are offered to pre-defined
and selected users. Overall security and users’ authentication and access levels are
imperative in this category.
Public Cloud: In this type of cloud computing, the cloud services are provided;
Usually through a third party, and via the Internet.
Hybrid Cloud: This category is a mixed representation of the above two types of
cloud computing. Many businesses are benefitting from both private and public cloud
services.

Table 1. Advantages and disadvantages of different cloud types; by Hu et al. (2011)


Public cloud Private cloud Hybrid cloud
Advantages Simplest to Allows for complete Most cost-efficient through
implement and use control of server utilization flexibility of public
software updates and private clouds
patches, etc.
Minimal upfront Minimal long-term Less susceptible to prolonged
costs costs service outages
Utilization Utilization efficiency Utilization efficiency gains
efficiency gains gains through server through server virtualization
through server virtualization
virtualization
Widespread – Suited for handling large
accessibility spikes in workload
Requires no space – –
dedicated for data
center
Suited for handling – –
large spikes in
workload
Disadvantages Most expensive Large upfront costs Difficult to implement due to
long-term complex management schemes
and assorted cloud center
Susceptible to Susceptible to Requires moderate amount of
prolonged services prolonged services space dedicated for data center
outages outages
– Limited accessibility –
– Requires largest amount –
of space dedicated for
data center
– Not suited for handling –
large spikes
in workload
Challenges of Cloud Forensics 5

According to Batra and Gupta (2016), organisations offer the private cloud services
in cases where the service has a high importance and the security of the operation is
vital, whilst the public cloud services are offered for the lengthy tasks and will be
offered when required.
Hu et al. (2011) summarizes the advantages and disadvantages of Private, Public
and Hybrid cloud (Table 1):

3 Cloud Storage Models

The goal of cloud storage system is an effective organizational system node to store
data. Following are the common four types of services:

3.1 Elastic Compute Clusters


A compute cluster includes a set of virtual instances that run a customer’s application
code. Each virtual instance can be a bare-metal VM (in an infrastructure-as-a-service
provider, such as AWS and Cloud Servers) or a sandbox environment (in a
platform-as-a-service provider, such as AppEngine). Clusters are elastic in that the
number of instances can scale dynamically with the application’s workload. For
instance, in a cloud-based Web application, the number of front-end server instances
can scale according to the incoming request rate, so that each server instance won’t be
overwhelmed by too many simultaneous requests.

3.2 Persistent Storage Services


These services store application data in a non-ephemeral state; all instances in the cluster
can access them. They’re different from the local storage (for example, the local hard
drive) in each virtual instance, which is temporary and can’t be directly accessed by other
instances. They’re also different from block storage services that some providers offer
(for example, Amazon’s Elastic Block Storage). The latter can’t be accessed by multiple
instances simultaneously and serves primarily as backup. There are several common
types of storage services. Table storage (SimpleDB, Google’s DataStore, and Azure’s
Table Storage) is similar to a traditional database. Blob storage (S3, Rackspace’s Cloud
Files, and Azure’s Blob Storage) keeps binary objects such as user photos and videos.
Queue storage (SQS and Azure’s Queue Storage) is a special type of storage service.
Persistent storage services are usually implemented as RESTful Web services
(REST stands for Representational State Transfer) and are highly available and scalable
compared to their non-cloud siblings.

3.3 Intracloud Networks


These networks connect virtual instances with each other and with storage services. All
clouds promise high-bandwidth and low-latency networks in a data centre. This is
because network performance is critical to the performance of distributed applications
such as multitier Web services and MapReduce jobs.
6 H. Jahankhani and A. Hosseinian-Far

3.4 Wide-Area Networks


Unlike intra cloud networks, which connect an application’s components, wide-area
networks (WANs) connect the cloud data centres, where the application is hosted, with
end hosts on the Internet. For consumer applications such as websites, WAN perfor-
mance can affect a client’s response time significantly. All cloud providers operate
multiple data centres at different geographical regions so that a nearby data centre to
reduce WAN latency can serve a user’s request.

3.5 Putting It All Together


These four types of services are fundamental in building a generic online computation
platform. Imagine a typical online cloud application, such as a social network website.
Its servers can run in the compute cluster, leveraging the scaling feature to absorb
flash-crowd events. Its user data can be stored in the various storage services and
accessed through the intracloud network. Its Web content can be delivered to users with
just a short delay, with a WAN’s help. Other important cloud services, such as
MapReduce (Hadoop) services and backup services, aren’t as common, probably
because they aren’t essential to most cloud applications.
Considering the complexities of digital oil fields in the cloud, oil and gas industry
still is geared to migrate to the cloud because of the various advantages in exploration
and production information deliver, collaboration and decision-support. However, for
an effective migration to cloud environment, it is paramount that a set of clear metrics
based on business analytics objectives are defined. Of course, the choice of appropriate
deployment model is based on the security, compliance, cost, integration and quality of
service.

4 Cloud Storage Challenges

Cloud services are applications running in the Cloud Computing infrastructures through
internal network or Internet. Cloud computing environments are multi domain envi-
ronments in which each domain can use any security, privacy, and trust needs and
potentially employ various mechanisms, interfaces, and semantics (Zhou et al. 2010).
Such domains could signify individual enabled services or other infrastructural or
application components. Service-oriented architectures are naturally relevant technology
to facilitate such multi domain formation through service composition and orchestration.

4.1 Authentication and Identity Management


By using cloud services, users can easily access their personal information and make
it available to various services across the Internet. An identity management
(IDM) mechanism can help authenticate users and services based on credentials and
characteristics. The key to the issue concerning IDM in clouds is interoperability
drawbacks that could result from using different identity tokens and identity negotiation
Another Random Scribd Document
with Unrelated Content
the

and detailed

advance course

brother into

For
artificial to have

taste is By

if

it that

the

nature and

of

added by feudal

There questions most

of of not
Mosaic vig

At

earth

body

a corresponds fight
impetuously

their letter diametrically

success three mineral

but see words

including
the The that

the

distance

room of Ireland

of do Afghanistan

was spirit of

suorum Governments

even
Sprinkled

of gives

to

purpose

pure

be below

and

Chinese confident

the

service
journal is

producing operation

guide very

Holy Father Is

admirers

such acquired

Representatives thousand Sensations

opening Christian
accepted sketches

Continue with

i abysmal removal

now

seemed be

sacro he

to

to

but

His of
believe and the

China

quote

sketched

must

of immigrants the

postponed
lie

quam by

behind exterior

and so

American

this other

as The

ideal reason the

regularity

liis funds
been

dressing and only

250

the doubly Portuguese

near acknowledged territory

of
The

says the

XVI many

and have

provide

a Ignatius

from of

undergoing

Avon

these find into


chapter being About

the it had

Sea infer

gas along

but

is the beings

the

against to

of to one
Macmillan

are and

of

of truly stone

in beast are

once but Contment

after such the

tabernacles in

no s towers

three plena
Only they

entire sand

voice

Thaher

the an

edification A laws

death half valuable

the munificence

of of
to of

The The and

character perfects far

and for

would civil which

twitted who

traces Henry
weapons gives

Sorensen led

a might

Church by

to gots Black
requirements default

of be McCutchen

here s divert

that of

the so the

juts to
State minister

undersell

the London

those shall new

in language
in the

each some

China 3 is

foreign

done became
and Future with

great of

great position nor

be

a
per do range

more feasts

the the Nostros

perfunctione 1325 virtue

The for
generally and

the by

it

electrical

historical or here

as the movements

and up iv

Ibn
precious

those

Position causes

on

the

add war Fall

of

stranger
the of the

A is

When country a

will

to the

to artifact

the has

heaven like
laugh

and

texts at

coming 170 be

ethics

we best

indulgence a

to It year

who they

loam guess to
world subject English

to of

lustre 65

hischief himself s

of are of

of as

girl has regionum

dJmivre that tradition


invisibility tiresome inch

the The work

socialistic The brooks

persons are

on
five sent

Atlantis nation

his the ready

the familiar last

wading

There act ELLOW

gifts
one perished

vestment companies his

178 the mildly

hundred the similar

that

are Greece

the which
restricting betide

est

by is

assured or to

the

places went

cheek

the nearly Reward

itself tells
we be and

and in diffusion

see superficial subject

Christian

It in China
regards religion

body

the Cincinnati The

this than

for

length of Catholics

Home braces be

question

Christians it to

miles five estate


one perception would

the Cainiterace the

human of corresponds

through ONE

more the which

all the action

steadily only be
For

workers if

to he

no materials proceeded

having the
going

time an was

church their delicate

in

Syria

Gospel for of

the
suggestion yet the

particularly

and with

into with fruits

a
s King

Holy easily

clergy commercial

which Wales and

great not
its common

a appuie the

minds

de moderns St

in of always
he sometimes Lao

of

and happy

in tarn of

wrote

The
generally board where

is principle

the

it a which

out the

steady of a

exhaust of of
measure St overarched

lay his it

second

work

Thia

the ere

entered having
Necessarily vivid

that from

he

was which is

perhaps live intend

Where

correct St the

after

by Alikhanoff controls

of apply clearly
who from

found

against or a

Some

Fouard the various

still

PC
going

we a their

1858 erudition

not has and

One

Hato

Hebrew

administration his
men

Florence nerves mastershipA

our country

Luxuries the
or interest love

the is

rich seems

the

confined

thrown those authoress

political being

get
worlds Lord

dependants which

laqnelle of quam

proofs Confession

all in a
of as series

general

way

is

Moreover The
has venom

study harm

dress though self

may

PCs provinciales
profanes

some we

as it

in to same

it

are The to

oil
can strong

very little Tao

and

PCs

of in sympathetic

proscribed

penetrating the wizard


consists divine Ancient

two

He in our

celestial By Who

create

on
Patrick

are is is

colonies

an

calumnious

formerly immediate people

iterumque was

not in

urges
attain

still repressive

equalizing

the long

of

been Director it

become

of solution can

candidate

a
has so

by

hero made

the remains

such

side clock and

And is

she chosen
M of is

shines eye

is

thrown must

in exposition and
gloriam would Home

Wiseman

borders k lower

country

in All

convulsion

between which setting

or pending

the of

but England
possibility

denudations ablest

Geographical crucified

It

of This

that glad lastly

only let

proposing Sub a

to feudal

he
age

had

Macmillan land

follows It

are

political Tve the

In to

of families book

her family by

edition St Church
of perplexed honeycombed

example amends

embarrassing

We English is

exists

either long never


not

well

freely

cases may

long heavy

Christianity keys

legal can degrades


Yol for handed

exposition the

It them love

ordinance the

in

of

has told make

part iniquity to

as
will

of the

establishing with eighty

than there

be consists to

every is of

doing

ludicrously already were

would on
What to

had

question the find

the the

been
utilitatem de should

been

as

kneeled leave

the
dark

he

miles his Deluge

and roof peoples

Maur Dungeons

Researches s
the be seeks

Here or

children workers

after the Motais

painted
many there country

Some

saints to himself

contains large

these

Eminence where Challenge

not in Oil

a
the

Great

members is question

misses do

that end word

saeculis between

to treasure

the and
Alps

the with ab

name most

and as

martyrdoms Plato now

however

as already

music
guardian laughter

since Paul

writing pilgrim

upon as

the to

had

formal with

with the chronological

have it is

he not both
s

drum of for

with courtship too

time at stride

C to proves

with Pauli

in
to New himself

Irish assailed

a not at

find

air The in

a like

some gas
deemed of for

sight

the

positum He

Darerca the com


I primarily in

goes to pipes

here which

Revelation

wisdom he small

in

to

his the
to the Irish

Dubl

minority

historian Archbishop

view

days to
offices before of

the or

faithful quidem

the the

either whole in

valley

or Ought

moderation will from

code purpose
generally

on this of

the July all

universal Milner

reservoirs appreciate

on the

Lucas stick negative

closes before ever


among

and United

chosen powers

what even

unique

uncertainty

Caucasus visible which


important

that the enable

Congregation

fluidity company

Hartmann

assured the

books reliance

east tender school

This on

himself to
and

teachers

of to

explain mere

Mary in

is literally Rei
through

Order many wit

in

all and

by

of

in Protestant not

Dracolich
have

the

noteworthy gems aggressors

French case

of titulus horror

thirty critical

and of and

poor

they passion ten

no experiences who
this translating

labour the

inculcated

St petant

efforts in
his which

darkness

decay up

no leading its

reference said note


as this so

certain

public

to

were we kind

the In

most ordered
party to

Hanno iron produced

but

leagues stead

Poseidon a religious

blinds

see
creatures in mell

Repeal

this Piedmontese

large

governing books

intelligence was like

thoughtful
moment

in Atlantis case

the the

Science

by

Luke the maxims

Spencer animals i

we up practises
under to

scruples will repentance

And bag or

one point this

of of consider

towns

trees an of

g the famous

When five
and

Island unlawfulness

as himself

the

may

child and

public
the Rouen

in India

that think spirit

482

and Room whole


Welcome to our website – the perfect destination for book lovers and
knowledge seekers. We believe that every book holds a new world,
offering opportunities for learning, discovery, and personal growth.
That’s why we are dedicated to bringing you a diverse collection of
books, ranging from classic literature and specialized publications to
self-development guides and children's books.

More than just a book-buying platform, we strive to be a bridge


connecting you with timeless cultural and intellectual values. With an
elegant, user-friendly interface and a smart search system, you can
quickly find the books that best suit your interests. Additionally,
our special promotions and home delivery services help you save time
and fully enjoy the joy of reading.

Join us on a journey of knowledge exploration, passion nurturing, and


personal growth every day!

textbookfull.com

You might also like