SaaS, PaaS, IaaS, SLA, SLO, ISO 27037.

Everyday use of cloud services has exponentially increased primarily because of its popular price and because it is more convenient than the alternative physical computing services. Unfortunately, good marketing and lack of knowledge have lead many companies to enter the cloud without first performing a risk and security analysis. What happens when the cloud gets compromised is that you suffer a breach, and you find yourself in a position of having to conduct digital forensics and collect some data? What to do then? Is there an option to acquire data? Do you even know the location of your data? Can you tell if someone else has access to your data? Is the data located in the cloud service provider’s data center or they have a data storage service with the 3rd party? It is recommended to consider these issues before the actual incident has happened. But what can you actually do? This paper shows the standards that can be implemented in Cloud forensics and procedures and contracts that will facilitate analysis on a daily basis.


IEEE format

V. Dobrosavljević, M. Veinović, I. Barać, “Standard implementation in Cloud forensics,” in Synthesis 2015 - International Scientific Conference of IT and Business-Related Research, Belgrade, Singidunum University, Serbia, 2015, pp. 139-142. doi: 10.15308/Synthesis-2015-139-142 

APA format

Dobrosavljević, V., Veinović, M., Barać, I. (2015). Standard implementation in Cloud forensics. Paper presented at Synthesis 2015 - International Scientific Conference of IT and Business-Related Research. doi:10.15308/Synthesis-2015-139-142

BibTeX format

RefWorks Tagged format