**Author details**

Thankaraja Raja Sree\* and Somasundaram Mary Saira Bhanu Department of Computer Science and Engineering, National Institute of Technology, Tiruchirappalli, India

\*Address all correspondence to: trajasree87@gmail.com

© 2020 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/ by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

**115**

1302.6312

diin.2012.05.001

*Data Collection Techniques for Forensic Investigation in Cloud*

Information Technology; 2011 Dec 19; IEEE. pp. 110-116. DOI: 10.1109/

[9] Khan S, Gani A, Wahab AW, Bagiwa MA, Shiraz M, Khan SU, et al. Cloud log forensics: Foundations, state of the art, and future directions. ACM Computing Surveys (CSUR). 2016;**49**(1):7. DOI: 10.1145/2906149

[10] Kent K, Souppaya M. Guide to Computer Security Log Management. Gaithersburg: NIST Special Publication;

[11] Zhang OQ, Kirchberg M, Ko RK, Lee BS. How to track your data: The case for cloud computing provenance. In: 2011 Third IEEE International Conference on Cloud Computing Technology and Science; 2011 Nov 29; IEEE. -453. DOI: 446, 10.1109/CloudCom.2011.66

2006. p. 92. DOI: N060928K

[12] Quick D, Choo KK. Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata? Digital Investigation. 2013;**10**(3):266-277. DOI:

[13] Chung H, Park J, Lee S, Kang C. Digital forensic investigation of cloud storage services. Digital Investigation. 2012;**9**(2):81-95. DOI: 10.1016/j.

[14] Nepal S, Ranjan R, Choo KK. Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud Computing. 2015;**2**(2):78-84. DOI:

[15] Yusoff MN, Dehghantanha A, Mahmod R. Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram,

OpenWapp, and Line as case studies. In: Contemporary Digital Forensic Investigations of Cloud and Mobile

10.1016/j.diin.2013.07.001

diin.2012.05.015

10.1109/MCC.2015.36

FIT.2011.28

*DOI: http://dx.doi.org/10.5772/intechopen.82013*

[1] Mell P, Grance T. The NIST Definition of Cloud Computing. Computer Security Division,

**References**

DOI: NIST SP 500-292

Information Technology Laboratory, National Institute of Standards and Technology, United States Department of Commerce. Gaithersburg. 2011:1-7 DOI: Special Publication 800-145

[2] Liu F, Tong J, Mao J, Bohn R, Messina J, Badger L, et al. NIST Cloud Computing Reference Architecture. Gaithersburg: NIST Special Publication. 2011. pp. 1-28.

[3] Pichan A, Lazarescu M, Soh ST. Cloud forensics: Technical challenges, solutions and comparative analysis. Digital Investigation. 2015;**13**:38-57. DOI: 10.1016/j.diin.2015.03.002

[4] Guo H, Jin B, Shang T. Forensic investigations in cloud environments. In: 2012 International Conference on Computer Science and Information Processing (CSIP); 2012 Aug 24; IEEE. 2012. pp. 248-251. DOI: 978-1-4673-1411-4/12/

[5] Zawoad S, Hasan R. Cloud forensics: A meta-study of challenges, approaches, and open problems. 2013. arXiv preprint:

[6] Dykstra J, Sherman AT. Acquiring forensic evidence from infrastructure-

[7] Marty R. Cloud application logging for forensics. In: Proceedings of the 2011 ACM Symposium on Applied

[8] Anwar F, Anwar Z. Digital forensics for eucalyptus. In: 2011 Frontiers of

as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation. 2012;**9**:S90-S98. DOI: 10.1016/j.

Computing; 2011 Mar 21; ACM. 2011. pp. 178-184. DOI: 10.1145/1982185.1982226

*Data Collection Techniques for Forensic Investigation in Cloud DOI: http://dx.doi.org/10.5772/intechopen.82013*
