ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

WCSF 2015 - The International Workshop on Cloud Security and Forensics

Date2015-08-24

Deadline2015-04-01

VenueToulouse, France France

Keywords

Websitehttps://www.ares-conference.eu/conferenc...

Topics/Call fo Papers

Cloud computing offers utility oriented Information and Communications Technology (ICT) services to users all over the world. The evolution of cloud computing is driving the design of datacentres by architecting them as networks of virtual services; this enables users to access and run applications from anywhere in the world. As the prevalence and usage of networked cloud computer systems increases, logically the security of these systems can pose significant security concerns and the likelihood of these systems being used for criminal behaviour also increases. Thus, this new computing evolution has a direct effect on, and creates challenges for, cybersecurity and digital forensic practitioners.
The field of digital forensics has grown rapidly over the last decade due to the rise of the Internet and associated crimes; however while the theory is well established, the practical application of the discipline is still new and developing. Law enforcement agencies can no longer rely on traditional digital forensic methods of data acquisition through device seizure to gather relevant evidence pertaining to an investigation from cloud sources. Using traditional digital forensic methods will lead to the loss or overlooking of valuable evidential material hosted on cloud-based infrastructures. Cloud computing and its impact on digital forensics will continue to grow and traditional digital forensics methods are inadequate for cloud forensic investigations.
Topics of interest comprise but are not limited to:
Cloud Forensics and e-Discovery
Intrusion and Attack Readiness
Cloud Cryptography
Datacentre and Data Security
Big Data Forensics Security and Privacy for Cloud Computing
Trust and Policy Management
Case Studies of Cloud-based Attacks
Cloud Data Recovery
Private Cloud Security

Last modified: 2015-01-24 15:39:39