@incollection{, 5368A6ECA6DDD5EF6AA2DED6A29A1B67 , author={{Mani MegalaiS} and {SCSVMV University, Kancheepuram}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}15114 } @incollection{b0, , title={{Digital Forensics for Network, Internet and Cloud Computing}} , author={{ PCunt } and { Garrison }} , booktitle={{Publication Copyright ©}} , publisher={Elsevier Inc} , year={2010} } @book{b1, , author={{ CMark } and { Chu-Carroll }} , title={{Copyright © 2011 Pragmatic Programmers, LLC}} , note={code in the Cloud} } @incollection{b2, , title={{Forensic investigations in Cloud environments}} , author={{ TingShang }} , booktitle={{International Conference on Computer Science and Information Processing}} , publisher={CSIP} , year={2012} } @incollection{b3, , title={{Cloud Forensics: Concepts, Issues, and Challenges}} , author={{ ShahrzadZargari } and { DavidBenford }} , booktitle={{2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT)}} } @book{b4, , title={{Forensics investigation challenges in cloud computing environments}} , author={{ MohsenDamshenas } and { AliDehghantanha } and { RamlanMahmoud }} , year={2012} , note={Solahuddin bin Shamsuddin} } @book{b5, , title={{Concepts and Terms: High-Tech Crime Brief}} , author={{ TonyKrone }} , year={2005} } @book{b6, , title={{Future Directions in Technology-Enabled Crime}} , author={{ Kim-Kwang RaymondChoo } and { RussellSmith } and { RobMc Cusker }} , year={2007} 78 Australian Institute of Criminology } @incollection{b7, , title={{Cybercrime Forensics System in Cloud Computing}} , author={{ ChengYan }} , booktitle={{2011 International Conference On Image Analysis and Signal Processing (IASP)}} } @book{b8, , author={{ CyberSecurity }} , title={{Cyber Warfare and Digital Forensic}} , publisher={Cyber Sec} }