Conference on Cloud Computing (CLOUD). IEEE, 2010,
pp. 450–457.
[2] Market Research Media, “Global cloud computing market
forecast 2015-2020,” http://www.marketresearchmedia.com/
2012/01/08/global-cloud-computing-market/, [Accessed July
5th, 2012].
[3] Gartner, “Worldwide cloud services market to surpass
$68 billion in 2010,” http://www.gartner.com/it/page.jsp?id=
1389313, 2010, [Accessed July 5th, 2012].
[4] INPUT, “Evolution of the cloud: The future of cloud comput-
ing in government,” http://iq.govwin.com/corp/library/detail.
cfm?ItemID=8448&cmp=OTC-cloudcomputingma042009,
2009, [Accessed July 5th, 2012].
[5] Clavister, “Security in the cloud,” http://www.
clavister.com/documents/resources/white-papers/
clavister-whp-security-in-the-cloud-gb.pdf, Clavister White
Paper, [Accessed July 5th, 2012].
[6] Amazon, “Zeus botnet controller,” http://aws.amazon.com/
security/security-bulletins/zeus-botnet-controller/, Amazon
Security Buletin, [Accessed July 5th, 2012].
[7] FBI, “Annual report for fiscal year 2007,” 2008 Regional
Computer Forensics Laboratory Program, 2008, [Accessed
July 5th, 2012].
[8] P. Mell and T. Grance, “Draft NIST working definition of
cloud computing-v15,” 21. Aug 2009, 2009.
[9] Open Cloud Consortium, “Open cloud manifesto,” The Open
Cloud Manifestto Consortium, 2009.
[10] D. Parkhill, “The challenge of the computer utility,” Addison-
Wesley Educational Publishers Inc, US, 1966.
[11] A. Michael, F. Armando, G. Rean, D. Anthony, K. Randy,
K. Andy, L. Gunho, P. David, R. Ariel, S. Ion et al., “Above
the clouds: A Berkeley view of cloud computing,” EECS
Department, University of California, Berkeley, Tech. Rep.
UCB/EECS-2009-28, 2009.
[12] Salesforce, “Social enterprise and crm in the cloud - sales-
force.com,” http://www.salesforce.com/, 2012, [Accessed July
5th, 2012].
[13] Google, “Google drive,” https://drive.google.com/start#home,
[Accessed July 5th, 2012].
[14] ——, “Google calendar,” https://www.google.com/calendar/,
[Accessed July 5th, 2012].
[15] GAE, “Google app engine,” http://appengine.google.com,
[Accessed July 5th, 2012].
[16] Azure, “Windows azure,” http://www.windowsazure.com,
[Accessed July 5th, 2012].
[17] B. Grobauer and T. Schreck, “Towards incident handling
in the cloud: challenges and approaches,” in Proceedings
of the 2010 ACM workshop on Cloud computing security
workshop, ser. CCSW ’10. New York, NY, USA: ACM,
2010, pp. 77–86. [Online]. Available: http://doi.acm.org/10.
1145/1866835.1866850
[18] Amazon EC2, “Amazon elastic compute cloud (amazon ec2),”
http://aws.amazon.com/ec2/, [Accessed July 5th, 2012].
[19] H. Motahari-Nezhad, B. Stephenson, and S. Singhal, “Out-
sourcing business to cloud computing services: Opportunities
and challenges,” IEEE Internet Computing, Palo Alto, vol. 10,
2009.
[20] Amazon, “Amazon simpledb,” http://aws.amazon.com/
simpledb/, 2012, [Accessed July 5th, 2012].
[21] F. Chang, J. Dean, S. Ghemawat, W. Hsieh, D. Wallach,
M. Burrows, T. Chandra, A. Fikes, and R. Gruber, “Bigtable:
A distributed storage system for structured data,” ACM Trans-
actions on Computer Systems (TOCS), vol. 26, no. 2, p. 4,
2008.
[22] J. Wiles, K. Cardwell, and A. Reyes, The best damn cyber-
crime and digital forensics book period. Syngress Media
Inc, 2007.
[23] K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to
integrating forensic techniques into incident response,” NIST
Special Publication, pp. 800–86, 2006.
[24] D. Lunn, “Computer forensics–an overview,” SANS Institute,
vol. 2002, 2000.
[25] J. Robbins, “An explanation of computer forensics,” National
Forensics Center, vol. 774, pp. 10–143, 2008.
[26] K. . L. Gates, “E-discovery amendments to the federal rules
of civil procedure go into effect today,” http://bit.ly/UJU5cs,
December 2006, [Accessed July 5th, 2012].
[27] K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, “Cloud
forensics: An overview,” in proceedings of the 7th IFIP
International Conference on Digital Forensics, 2011.
[28] D. Birk, “Technical challenges of forensic investigations in
cloud computing environments,” in Workshop on Cryptogra-
phy and Security in Clouds, January 2011.
[29] J. Dykstra and A. Sherman, “Understanding issues in cloud
forensics: Two hypothetical case studies,” Journal of Network
Forensics, vol. b, no. 3, pp. 19–31, 2011.
[30] H. Guo, B. Jin, and T. Shang, “Forensic investigations in
cloud environments,” in Computer Science and Information
Processing (CSIP), 2012 International Conference on. IEEE,
2012, pp. 248–251.
[31] S. Wolthusen, “Overcast: Forensic discovery in cloud environ-
ments,” in proceedings of the Fifth International Conference
on IT Security Incident Management and IT Forensics (IMF).
IEEE, 2009, pp. 3–9.
[32] D. Reilly, C. Wren, and T. Berry, “Cloud computing: Pros
and cons for computer forensic investigations,” International
Journal Multimedia and Image Processing (IJMIP), vol. 1,
no. 1, pp. 26–34, March 2011.
[33] M. D. Ludwig Slusky, Parviz Partow-Navid, “Cloud comput-
ing and computer forensics for business applications,” Journal
of Technology Research, vol. 3, July 2012.