Skip to main content

Cloud Forensics and Security

Cloud Computing is becoming more and more appealing to organisations and individuals as a platform for ubiquitous, on-demand, high power and low cost computation. Unsurprisingly, the benefits and opportunities of clouds attract not only legitimate users, but also cybercriminals. It exacerbates the possibility of large-scale illegal activities (e.g., storage and distribution of illicit material, deployment of botnet infrastructure, and phishing campaigns), facilitates novel business models, such as crime-as-a-service and “dark clouds”, and enables new forms of attacks and data misuse. This reality poses many challenges to different stakeholders in terms of preventing (the security aspect) and reacting (the forensics aspect) to those illegal activities. This thematic series contains technical papers and case-studies from academic and professional perspectices with a focus on advancing the practice of cloud forensics and cloud security.

Edited by: 

Virginia N. L. Franqueira, University of Derby, UK
 Raul H. C. Lopes, Brunel University, JISC & CMS/CERN, UK
 Andrew Jones, University of Hertfordshire, UK
Tim Storer, University of Glasgow, UK


  1. Research

    CFaaS: bilaterally agreed evidence collection

    A common cloud forensic model proposed by researchers is ‘Cloud-Forensic-as-a-Service’ where consumers have to access it as a service to collect forensic data from cloud environments. The ‘Cloud-Forensic-as-a-...

    Ahmed Nour Moussa, Norafida Ithnin and Anazida Zainal

    Journal of Cloud Computing 2018 7:1

    Published on: 5 January 2018

  2. Research

    Classifying malware attacks in IaaS cloud environments

    In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies ...

    Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann de Meer and Hans P. Reiser

    Journal of Cloud Computing 2017 6:26

    Published on: 8 December 2017