The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


The cloud computing is nowadays an embarrassing computing technology by many organisations, academic institutions and business centres. Cloud Service Providers (CSP)s are limited to some resources, lacking some resources requested by its customers, this gives rise to the needs for interconnecting multiple clouds to interoperate and share resources. The interconnected clouds can be in different features and schemes, and the system can be prone to insecurity or intrusion. In this paper, we developed a Digital Forensics framework that can detect an intrusion within heterogeneous joint clouds. We also developed architecture and algorithm that can handle the joint clouds heterogeneity and complexity during inter-clouds resources management.


User
Notifications
Font Size