Kalloniatis Christos | University of the Aegean (original) (raw)

Uploads

Papers by Kalloniatis Christos

Research paper thumbnail of Towards the Development of a Cloud Forensics Methodology: A Conceptual Model

Lecture Notes in Business Information Processing, 2015

Cloud Computing technology and services despite the advantages they bring to the market have crea... more Cloud Computing technology and services despite the advantages they bring to the market have created number of issues regarding the security and trust of the individuals using them. Incidents occurring in cloud computing environments are hard to be solved since digital forensic methods used to conduct digital investiga-tions are not suitable for cloud computing investigations since they do not con-sider the specific characteristics of the Cloud. However, designing services over the cloud that will support and assist an investigation process when an incident occurs is also of vital importance. This paper presents a conceptual model for supporting the development of a cloud forensics method and process, thus assist-ing information systems developers in building better services and investigators to be able to conduct forensics analysis in cloud environments.

Research paper thumbnail of Towards the development of a Cloud Forensics Methodology: A Conceptual Model

Cloud Computing technology and services despite the advantages they bring to the market have crea... more Cloud Computing technology and services despite the advantages they bring to the market have created number of issues regarding the security and trust of the individuals using them. Incidents occurring in cloud computing environments are hard to be solved since digital forensic methods used to conduct digital investiga-tions are not suitable for cloud computing investigations since they do not con-sider the specific characteristics of the Cloud. However, designing services over the cloud that will support and assist an investigation process when an incident occurs is also of vital importance. This paper presents a conceptual model for supporting the development of a cloud forensics method and process, thus assist-ing information systems developers in building better services and investigators to be able to conduct forensics analysis in cloud environments.

Research paper thumbnail of Protecting privacy in system design: the electronic voting case

Transforming Government: People, Process and Policy, 2007

Purpose -The purpose of the paper is to present Privacy Safeguard (PriS) a formal security requir... more Purpose -The purpose of the paper is to present Privacy Safeguard (PriS) a formal security requirements engineering methodology which, incorporates privacy requirements in the system design process and to demonstrate its applicability in an e-voting case. Design/methodology/approach -PriS provides a methodological framework for addressing privacy-related issues during system development. It provides a set of concepts for formally expressing privacy requirements (authentication, authorisation, identification, data protection, anonymity, pseudonymity, unlinkability and unobservability) and a systematic way-of-working for translating these requirements into system models. The main activities of the PriS way-of-working are: elicit privacy-related goals, analyse the impact of privacy goals on processes, model affected processes using privacy process patterns and identify the technique(s) that best support/implement the above-process patterns. Findings -Analysis of a number of well known privacy-enhancing technologies, as well as of existing security requirement engineering methodologies, pinpoints the gap between system design methodologies and technological solutions. To this end, PriS provides an integrated approach for matching privacy-related requirements to proper implementation techniques. Experimentation with the e-voting case suggests that PriS has a high degree of applicability on internet systems that wish to provide services that ensure users privacy, such as anonymous browsing, untraceable transactions, etc. Originality/value -The paper proposes a new methodology for addressing privacy requirements during the design process. Instead of prescribing a single solution, PriS guides developers to choose the most appropriate implementation techniques for realizing the identified privacy issues. In addition, due to its formal definition it facilitates control of the accuracy and precision of the results and enables the development of automated tools for assisting its application.

Research paper thumbnail of Cloud Forensics Solutions: A Review

Cloud computing technology attracted many Internet users and organizations the past few years and... more Cloud computing technology attracted many Internet users and organizations the past few years and has become one of the hottest topics in IT. However, due to the newly appeared threats and challenges arisen in cloud computing, current methodologies and techniques are not designed for assisting the respective forensic processes in cloud environments. Challenges and issues introduced, require new solutions in cloud forensics. To date, the research conducted in this area concerns mostly the identification of the major challenges in cloud forensics. This paper focuses on the identification of the available technical solutions addressed in the respective literature that have an applicability on cloud computing. Furthermore it matches the identified solutions with the respective challenges already mentioned in the respective literature. Specifically, it summarizes the methods and the proposed solutions used to conduct an investigation, in comparison to the respective cloud challenges and finally it highlights the open problems in the area of cloud forensics.

Research paper thumbnail of Towards the Development of a Cloud Forensics Methodology: A Conceptual Model

Lecture Notes in Business Information Processing, 2015

Cloud Computing technology and services despite the advantages they bring to the market have crea... more Cloud Computing technology and services despite the advantages they bring to the market have created number of issues regarding the security and trust of the individuals using them. Incidents occurring in cloud computing environments are hard to be solved since digital forensic methods used to conduct digital investiga-tions are not suitable for cloud computing investigations since they do not con-sider the specific characteristics of the Cloud. However, designing services over the cloud that will support and assist an investigation process when an incident occurs is also of vital importance. This paper presents a conceptual model for supporting the development of a cloud forensics method and process, thus assist-ing information systems developers in building better services and investigators to be able to conduct forensics analysis in cloud environments.

Research paper thumbnail of Towards the development of a Cloud Forensics Methodology: A Conceptual Model

Cloud Computing technology and services despite the advantages they bring to the market have crea... more Cloud Computing technology and services despite the advantages they bring to the market have created number of issues regarding the security and trust of the individuals using them. Incidents occurring in cloud computing environments are hard to be solved since digital forensic methods used to conduct digital investiga-tions are not suitable for cloud computing investigations since they do not con-sider the specific characteristics of the Cloud. However, designing services over the cloud that will support and assist an investigation process when an incident occurs is also of vital importance. This paper presents a conceptual model for supporting the development of a cloud forensics method and process, thus assist-ing information systems developers in building better services and investigators to be able to conduct forensics analysis in cloud environments.

Research paper thumbnail of Protecting privacy in system design: the electronic voting case

Transforming Government: People, Process and Policy, 2007

Purpose -The purpose of the paper is to present Privacy Safeguard (PriS) a formal security requir... more Purpose -The purpose of the paper is to present Privacy Safeguard (PriS) a formal security requirements engineering methodology which, incorporates privacy requirements in the system design process and to demonstrate its applicability in an e-voting case. Design/methodology/approach -PriS provides a methodological framework for addressing privacy-related issues during system development. It provides a set of concepts for formally expressing privacy requirements (authentication, authorisation, identification, data protection, anonymity, pseudonymity, unlinkability and unobservability) and a systematic way-of-working for translating these requirements into system models. The main activities of the PriS way-of-working are: elicit privacy-related goals, analyse the impact of privacy goals on processes, model affected processes using privacy process patterns and identify the technique(s) that best support/implement the above-process patterns. Findings -Analysis of a number of well known privacy-enhancing technologies, as well as of existing security requirement engineering methodologies, pinpoints the gap between system design methodologies and technological solutions. To this end, PriS provides an integrated approach for matching privacy-related requirements to proper implementation techniques. Experimentation with the e-voting case suggests that PriS has a high degree of applicability on internet systems that wish to provide services that ensure users privacy, such as anonymous browsing, untraceable transactions, etc. Originality/value -The paper proposes a new methodology for addressing privacy requirements during the design process. Instead of prescribing a single solution, PriS guides developers to choose the most appropriate implementation techniques for realizing the identified privacy issues. In addition, due to its formal definition it facilitates control of the accuracy and precision of the results and enables the development of automated tools for assisting its application.

Research paper thumbnail of Cloud Forensics Solutions: A Review

Cloud computing technology attracted many Internet users and organizations the past few years and... more Cloud computing technology attracted many Internet users and organizations the past few years and has become one of the hottest topics in IT. However, due to the newly appeared threats and challenges arisen in cloud computing, current methodologies and techniques are not designed for assisting the respective forensic processes in cloud environments. Challenges and issues introduced, require new solutions in cloud forensics. To date, the research conducted in this area concerns mostly the identification of the major challenges in cloud forensics. This paper focuses on the identification of the available technical solutions addressed in the respective literature that have an applicability on cloud computing. Furthermore it matches the identified solutions with the respective challenges already mentioned in the respective literature. Specifically, it summarizes the methods and the proposed solutions used to conduct an investigation, in comparison to the respective cloud challenges and finally it highlights the open problems in the area of cloud forensics.