Emerging from The Cloud: A Bibliometric Analysis of Cloud Forensics Studies

Emergence of cloud computing technologies have changed the way we store, retrieve, and archive our data. With the promise of unlimited, reliable and always-available storage, a lot of private and confidential data are now stored on different cloud platforms. Being such a gold mine of data, cloud platforms are among the most valuable targets for attackers. Therefore, many forensics investigators have tried to develop tools, tactics and procedures to collect, preserve, analyse and report evidences of attackers’ activities on different cloud platforms. Despite the number of published articles there isn’t a bibliometric study that presents cloud forensics research trends. This paper aims to address this problem by providing a comprehensive assessment of cloud forensics research trends between 2009 and 2016. Moreover, we provide a classification of cloud forensics process to detect the most profound research areas and highlight remaining challenges.

[1]  Alan T. Sherman,et al.  Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..

[2]  P. Mell,et al.  SP 800-145. The NIST Definition of Cloud Computing , 2011 .

[3]  Ali Dehghantanha,et al.  Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study , 2017, Journal of forensic sciences.

[4]  Chris Wren,et al.  Cloud computing: Forensic challenges for law enforcement , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[5]  E. Garfield,et al.  Can Citation Indexing Be Automated ? , 1964 .

[6]  Lutz Bornmann,et al.  What do citation counts measure? A review of studies on citing behavior , 2008, J. Documentation.

[7]  Daniel Jones,et al.  The history and meaning of the term "phoneme" , 1957 .

[8]  Nasir Raza Challenges to network forensics in cloud computing , 2015, 2015 Conference on Information Assurance and Cyber Security (CIACS).

[9]  Christoph Wegener,et al.  Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[10]  Alice Hutchings,et al.  Criminals in the Cloud: Crime, Security Threats, and Prevention Measures , 2015 .

[11]  Ali Dehghantanha,et al.  A Cyber Kill Chain Based Taxonomy of Banking Trojans for Evolutionary Computational Intelligence , 2017, J. Comput. Sci..

[12]  Kim-Kwang Raymond Choo,et al.  An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..

[13]  J. Hirsch Does the h index have predictive power? , 2007, Proceedings of the National Academy of Sciences.

[14]  Ali Dehghantanha,et al.  Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..

[15]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[16]  Ali Dehghantanha,et al.  Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study , 2018, IEEE Transactions on Sustainable Computing.

[17]  Kim-Kwang Raymond Choo,et al.  Cloud Storage Forensic Framework , 2014 .

[18]  Nathan Clarke,et al.  A forensic acquisition and analysis system for IaaS , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).

[19]  Y. Iraqi,et al.  A State-of-the-Art Review of Cloud Forensics , 2014, J. Digit. Forensics Secur. Law.

[20]  Kim-Kwang Raymond Choo,et al.  Cloud incident handling and forensic‐by‐design: cloud storage as a case study , 2017, Concurr. Comput. Pract. Exp..

[21]  Ali Dehghantanha,et al.  Cloud Storage Forensic: hubiC as a Case-Study , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).

[22]  Leena Jain,et al.  An Approach for Investigating Perspective of Cloud Software-as-a-Service (SaaS) , 2010 .

[23]  Kim-Kwang Raymond Choo,et al.  Cloud Storage Forensics , 2013, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.

[24]  Alan T. Sherman,et al.  UNDERSTANDING ISSUES IN CLOUD FORENSICS: TWO HYPOTHETICAL CASE STUDIES , 2011 .

[25]  Ali Dehghantanha,et al.  Intelligent OS X malware threat detection with code inspection , 2018, Journal of Computer Virology and Hacking Techniques.

[26]  Sieteng Soh,et al.  Cloud forensics: Technical challenges, solutions and comparative analysis , 2015, Digit. Investig..

[27]  Ali Dehghantanha,et al.  Forensics investigation challenges in cloud computing environments , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[28]  Steven Furnell,et al.  Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions , 2013, 2013 Information Security for South Africa.

[29]  Kim-Kwang Raymond Choo,et al.  IT standards and guides do not adequately prepare IT practitioners to appear as expert witnesses: An Australian perspective , 2016 .

[30]  Nor Badrul Anuar,et al.  The rise of "malware": Bibliometric analysis of malware study , 2016, J. Netw. Comput. Appl..

[31]  Ali Dehghantanha,et al.  Know Abnormal, Find Evil: Frequent Pattern Mining for Ransomware Threat Hunting and Intelligence , 2018, IEEE Transactions on Emerging Topics in Computing.

[32]  Todd L. Heberlein,et al.  Network intrusion detection , 1994, IEEE Network.

[33]  Lokman I. Meho,et al.  Impact of data sources on citation counts and rankings of LIS faculty: Web of science versus scopus and google scholar , 2007, J. Assoc. Inf. Sci. Technol..

[34]  Kim-Kwang Raymond Choo,et al.  Dropbox analysis: Data remnants on user machines , 2013, Digit. Investig..

[35]  Ali Dehghantanha,et al.  Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices , 2016 .

[36]  Alan T. Sherman,et al.  Design and Implementation of FROST - Digital Forensic Tools for the OpenStack Cloud Computing Platform , 2016 .

[37]  Ali Dehghantanha,et al.  Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study , 2017, ArXiv.

[38]  Ali Dehghantanha,et al.  SugarSync forensic analysis , 2016 .

[39]  S. H. Mohtasebi,et al.  Chapter 13 – Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud , 2017 .

[40]  Ali Dehghantanha,et al.  Detecting crypto-ransomware in IoT networks based on energy consumption footprint , 2018, J. Ambient Intell. Humaniz. Comput..

[41]  Tooska Dargahi,et al.  Investigating Storage as a Service Cloud Platform: pCloud as a Case Study , 2017, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.

[42]  Mohand Tahar Kechadi,et al.  Cloud Forensics , 2011, IFIP Int. Conf. Digital Forensics.

[43]  E. Garfield The history and meaning of the journal impact factor. , 2006, JAMA.

[44]  Ali Dehghantanha,et al.  A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..

[45]  Tim Storer,et al.  Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics , 2014, Int. J. Digit. Crime Forensics.

[46]  Ali Dehghantanha,et al.  Residual Cloud Forensics: CloudMe and 360Yunpan as Case Studies , 2017, Contemporary Digital Forensic Investigations of Cloud and Mobile Applications.

[47]  E. Garfield Citation indexes for science. A new dimension in documentation through association of ideas. 1955. , 1955, International journal of epidemiology.

[48]  Nimisha Gupta,et al.  Cloud Computing: Comparison with Previous Technique and Research Challenges , 2014 .

[49]  Kim-Kwang Raymond Choo Cloud computing: Challenges and future directions , 2010 .

[50]  Henry Small Visualizing science by citation mapping , 1999 .

[51]  Matthew Metheny,et al.  Introduction to the federal cloud computing strategy , 2013, CloudCom 2013.

[52]  Xueling Wu,et al.  Global research trends in landslides during 1991–2014: a bibliometric analysis , 2015, Landslides.

[53]  Ali Dehghantanha,et al.  Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning , 2019, IEEE Transactions on Sustainable Computing.

[54]  Simon Chapman,et al.  The Association between Four Citation Metrics and Peer Rankings of Research Influence of Australian Researchers in Six Fields of Public Health , 2011, PLoS ONE.

[55]  Elie Bursztein,et al.  Beyond files recovery owade cloud-based forensic , 2011 .

[56]  Ali Dehghantanha,et al.  Cloud storage forensics: MEGA as a case study , 2017 .

[57]  Latesh G. Malik,et al.  Cloud Forensics: Issues and Challenges , 2013, 2013 6th International Conference on Emerging Trends in Engineering and Technology.

[58]  Shaftab Ahmed,et al.  Tackling cloud security issues and forensics model , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.