Special Issue "The Security and Digital Forensics of Cloud Computing"

A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Systems".

Deadline for manuscript submissions: 15 December 2018

Special Issue Editors

Guest Editor
Dr. Gary Wills

Electronics and Computer Science University of Southampton, UK
Website | E-Mail
Interests: security; big data; knowledge management; cloud computing; games
Guest Editor
Dr. Ahmed Alenezi

Electronics and Computer Science University of Southampton, UK
Website | E-Mail
Interests: parallel computing; digital forensics; cloud forensics; cloud security; internet of things forensics; internet of things security

Special Issue Information

Dear Colleagues,

Cloud computing is one of the fastest growing technologies in the field of computing. It is becoming more and more prevalent. Cloud computing has radically changed the way in which information technologies can be delivered. Although cloud computing has brought countless benefits to its consumers, these benefits can be misused for malicious purposes.

While the literature in cloud computing in general is not scarce, a number of related topics are still rich areas for research, some of which are cloud security and forensics. Many of the challenges in the field of cloud security and forensics need further investigation. This special issue is aimed to contribute to this research on topics related to cloud security and forensics. Topics of interest for submission include, but are not limited to:

Cloud Security

  • Cloud security readiness
  • Security-as-a-Service
  • Controlling access for cloud services
  • Trust as a Service
  • Cloud Governance
  • Cloud Security monitoring
  • Regulatory compliance
  • Security and Risks Management
  • Security challenges in cloud service models
  • Case studies related to cloud security
  • Current and future trends in cloud security

Cloud Forensics

  • Forensics-as-a-Service
  • Cloud application forensics
  • Cloud Forensics readiness
  • Digital evidence search and seizure in the cloud
  • Cloud forensics analysis
  • Incident handling in cloud computing
  • Investigative methodologies
  • Tools and practices in cloud forensics
  • Challenges of cloud forensics
  • Cybercrime investigation in cloud computing
  • Legal aspect of cloud investigations
  • Case studies related to cloud forensics
  • Current and future trends in cloud forensics

Dr. Gary Wills
Dr. Ahmed Alenezi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 850 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Digital Forensics
  • Digital Investigations
  • Cloud Computing
  • Cloud Forensics
  • Cloud Security

Published Papers (1 paper)

View options order results:
result details:
Displaying articles 1-1
Export citation of selected articles as:

Research

Open AccessArticle Perceptual Hashing Based Forensics Scheme for the Integrity Authentication of High Resolution Remote Sensing Image
Information 2018, 9(9), 229; https://doi.org/10.3390/info9090229
Received: 14 August 2018 / Revised: 2 September 2018 / Accepted: 5 September 2018 / Published: 7 September 2018
PDF Full-text (4639 KB) | HTML Full-text | XML Full-text
Abstract
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet the requirements. In this paper, a perceptual
[...] Read more.
High resolution remote sensing (HRRS) images are widely used in many sensitive fields, and their security should be protected thoroughly. Integrity authentication is one of their major security problems, while the traditional techniques cannot fully meet the requirements. In this paper, a perceptual hashing based forensics scheme is proposed for the integrity authentication of a HRRS image. The proposed scheme firstly partitions the HRRS image into grids and adaptively pretreats the grid cells according to the entropy. Secondly, the multi-scale edge features of the grid cells are extracted by the edge chains based on the adaptive strategy. Thirdly, principal component analysis (PCA) is applied on the extracted edge feature to get robust feature, which is then normalized and encrypted with secret key set by the user to receive the perceptual hash sequence. The integrity authentication procedure is achieved via the comparison between the recomputed perceptual hash sequence and the original one. Experimental results have shown that the proposed scheme has good robustness to normal content-preserving manipulations, has good sensitivity to detect local subtle and illegal tampering of the HRRS image, and has the ability to locate the tampering area. Full article
(This article belongs to the Special Issue The Security and Digital Forensics of Cloud Computing)
Figures

Figure 1

Back to Top