M. Bellare and B. Yee, Forward Integrity for Secure Audit Logs, 1997.

J. Benaloh and M. De-mare, One-Way Accumulators: A Decentralized Alternative to Digital Signatures, Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, pp.274-285, 1994.
DOI : 10.1007/3-540-48285-7_24

D. Birk and C. Wegener, Technical Issues of Forensic Investigations in Cloud Computing Environments, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011.
DOI : 10.1109/SADFE.2011.17

B. Bloom, Space/time trade-offs in hash coding with allowable errors, Communications of the ACM, vol.13, issue.7, pp.422-426, 1970.
DOI : 10.1145/362686.362692

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.2080

E. Casey, Error, uncertainty and loss in digital evidence, International Journal of Digital Evidence, vol.1, issue.2, 2002.

W. Delport, M. Kohn, and M. Olivier, Isolating a cloud instance for a digital forensic investigation, Proceedings of the Information Security for South Africa Conference, 2011.

J. Dykstra and A. Sherman, Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform, Digital Investigation, pp.87-95, 2013.
DOI : 10.1016/j.diin.2013.06.010

. Gartner, Gartner says that consumers will store more than a third of their digital content in the cloud by 2016, 2012.

D. Goodwin, Amazon cloud hosts nasty banking Trojan, The Register, 2011.

R. Hasan, R. Sion, and M. Winslett, Preventing history forgery with secure provenance, ACM Transactions on Storage, vol.5, issue.4, 2009.
DOI : 10.1145/1629080.1629082

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.7355

R. Hasan, R. Sion, and M. Winslett, The case of the fake Picasso: Preventing history forgery with secure provenance, Proceedings of the Seventh USENIX Conference on File and Storage Technologies, pp.1-14, 2009.

B. Hay and K. Nance, Forensics examination of volatile system data using virtual introspection, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.74-82, 2008.
DOI : 10.1145/1368506.1368517

R. Lu, X. Lin, X. Liang, and X. Shen, Secure provenance, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.282-292, 2010.
DOI : 10.1145/1755688.1755723

P. Macko and M. Chiarini, Collecting provenance via the Xen hypervisor, Proceedings of the Third Workshop on the Theory and Practice of Provenance, 2011.

K. Muniswamy-reddy, P. Macko, and M. Seltzer, Making a cloud provenance-aware, Proceedings of the First Workshop on the Theory and Practice of Provenance, 2009.

O. Schmidt, Managing a Legal Hold on Cloud Documents, U.S. Patent Application, 2014.

S. Thorpe and I. Ray, Detecting temporal inconsistency in virtual machine activity timelines, Journal of Information Assurance and Security, vol.7, issue.1, pp.24-31, 2012.

S. Zawoad, A. Dutta, and R. Hasan, SecLaaS, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13, pp.219-230, 2013.
DOI : 10.1145/2484313.2484342

S. Zawoad and R. Hasan, Towards building proofs of past data possession in cloud forensics, ASE Science Journal, vol.1, issue.4, pp.195-207, 2012.