. Freeeed, org -open-source ediscovery engine, 2011.

. Hadoop-mapreduce, http://hadoop.apache.org/mapreduce 5. Security guidance for critical areas of focus in cloud computing v3, p.0, 2011.

. Accessdata, Decryption and password cracking software

R. Accorsi, Business Process as a Service: Chances for Remote Auditing, 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops, 2011.
DOI : 10.1109/COMPSACW.2011.73

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.416.7971

I. Agudo, D. Nuñez, G. Giammatteo, P. Rizomiliotis, and C. Lambrinoudakis, Cryptography Goes to the Cloud, Proceedings of 1st International Workshop on Security and Trust for Applications in Virtualised Environments, pp.190-197, 2011.
DOI : 10.1007/978-3-540-70936-7_29

R. Ando, Y. Kadobayashi, and Y. Shinoda, Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module, Proceedings of Information Security and Cryptology, pp.131-143, 2007.
DOI : 10.1007/978-3-540-76788-6_11

J. Baliga, R. W. Ayre, K. Hinton, and R. S. Tucker, Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport, Proceedings of the IEEE, vol.99, issue.1, pp.149-167, 2011.
DOI : 10.1109/JPROC.2010.2060451

D. Barrett and G. Kipper, Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments. Syngress Media, 2010.

N. Beebe and N. Beebe, Digital Forensic Research: The Good, the Bad and the Unaddressed, Advances in Digital Forensics V, IFIP Advances in Information and Communication Technology, pp.17-36
DOI : 10.1016/j.diin.2004.07.006

S. Biggs and S. Vidalis, Cloud Computing: The impact on digital forensic investigations, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), pp.1-6, 2009.
DOI : 10.1109/ICITST.2009.5402561

D. Birk, Technical challenges of forensic investigations in cloud computing environments, Proceedings of the Workshop on Cryptography and Security in Clouds, pp.1-6, 2011.

D. Birk and C. Wegener, Technical Issues of Forensic Investigations in Cloud Computing Environments, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011.
DOI : 10.1109/SADFE.2011.17

D. Brezinski and T. Killalea, Guidelines for evidence collection and archiving, RFCBest Current Practice), vol.3227, p.3227, 2002.
DOI : 10.17487/rfc3227

G. H. Carlton and H. Zhou, A Survey of Cloud Computing Challenges from a Digital Forensics Perspective, International Journal of Interdisciplinary Telecommunications and Networking, vol.3, issue.4, pp.1-16, 2011.
DOI : 10.4018/jitn.2011100101

B. D. Carrier and E. H. Spafford, Getting physical with the digital investigation process, International Journal of Digital Evidence, vol.2, issue.2, pp.1-20, 2003.

E. Casey, COMPUTER CRIME AND DIGITAL EVIDENCE, pp.6-10, 2011.
DOI : 10.1016/B0-12-369399-3/00062-8

R. Chow, P. Golle, M. Jakobsson, R. Masuoka, and J. Molina, Controlling data in the cloud:outsourcing computation without outsourcing control, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp.85-90, 2009.

F. Cohen, Digital Forensic Evidence Examination -2nd Ed, 2010.

M. Cohen, D. Bilby, and G. Caronni, Distributed forensics and incident response in the enterprise, Digital Investigation, vol.8, issue.0, pp.101-110, 2011.
DOI : 10.1016/j.diin.2011.05.012

J. Dean and S. Ghemawat, MapReduce, Proceedings of the 6th Symposium on Operating Systems Design and Implementation . USENIX, 2004.
DOI : 10.1145/1327452.1327492

W. Delport, M. S. Olivier, and M. Koehn, Isolating a cloud instance for a digital forensic investigation, Proceedings of the 2011 Information Security for South Africa, 2011.

T. S. Dillon, C. Wu, and E. Chang, Cloud Computing: Issues and Challenges, 2010 24th IEEE International Conference on Advanced Information Networking and Applications, pp.27-33, 2010.
DOI : 10.1109/AINA.2010.187

A. O. Flaglien, A. Mallasvik, M. Mustorp, and A. Arnes, Storage and exchange formats for digital evidence, Digital Investigation, vol.8, issue.2, pp.122-128, 2011.
DOI : 10.1016/j.diin.2011.09.002

I. T. Foster, Y. Zhao, I. Raicu, and S. Lu, Cloud computing and grid computing 360- degree compared. Computing Research Repository abs/0901, pp.1-10, 2009.
DOI : 10.1109/gce.2008.4738445

URL : http://arxiv.org/abs/0901.0131

S. L. Garfinkel, Digital forensics research: The next 10 years, the Proceedings of the Tenth Annual DFRWS Conference, pp.64-73, 2010.
DOI : 10.1016/j.diin.2010.05.009

URL : https://calhoun.nps.edu/bitstream/10945/44251/1/Garfinkel_%20Digital_Forensics_2010.DFRWS.Next10Years.pdf

T. Garfinkel and M. Rosenblum, A virtual machine introspection based architecture for intrusion detection, Proceedings of the Network and Distributed System Security Symposium, 2003.

. Gartner, Gartner says worldwide cloud services market to surpass $68 billion in 2010, 2010.

G. Grispos, W. B. Glisson, and T. Storer, Calm before the storm: The emerging challenges of cloud computing in digital forensics, 2011.

R. Hegarty, M. Merabti, Q. Shi, and B. Askwith, Forensic analysis of distributed service oriented computing platforms, 2011.

K. Karen, S. Chevalier, T. Grance, and H. Dang, Guide to integrating forensic techniques into incident response, recommendations of the National Institute of Standards and Technology, 2006.

B. Kazarian and B. Hanlon, SMB Cloud Adoption Study, Global Report, 2010.

L. Ke, Design of a Forensic Overlay Model for Application Development, 2011.

K. Kourai and S. Chiba, HyperSpector, Proceedings of the 1st ACM/USENIX international conference on Virtual execution environments , VEE '05, pp.197-207, 2005.
DOI : 10.1145/1064979.1065006

S. Krishnan, K. Z. Snow, and F. Monrose, Trail of bytes, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.50-60, 2010.
DOI : 10.1145/1866307.1866314

R. Krutz and R. Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, 2010.

S. Kuhn and S. Taylor, A survey of forensic analysis in virtualized environments, Tech. rep., Dartmouth College, 2011.

B. Lempereur, M. Merabti, and Q. Shi, Pypette : A framework for the automated evaluation of live digital forensic techniques, Proceedings of the 11th Annual PostGraduate Symposium on The Convergence of Telecommunications Networking and Broadcasting, 2010.

T. Lillard, C. Garrison, C. Schiller, J. Steele, and J. Murray, Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data, 2010.

R. Lu, X. Lin, X. Liang, and X. S. Shen, Secure provenance, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, pp.282-292, 2010.
DOI : 10.1145/1755688.1755723

C. V. Marsico, Computer evidence v. daubert: The coming conflict, Cerias tech report 2005-17, Center for Education and Research in Information Assurance and Security, 2005.

R. Marty, W. C. Chu, W. E. Wong, M. J. Palakal, and C. C. Hung, Cloud application logging for forensics, Proceedings of the 2011 ACM Symposium on Applied Computing, SAC '11, pp.178-184, 2011.
DOI : 10.1145/1982185.1982226

S. Mason and E. George, Digital evidence and ?cloud? computing, Computer Law & Security Review, vol.27, issue.5, pp.524-528, 2011.
DOI : 10.1016/j.clsr.2011.07.005

P. Mell, T. Grance, and R. Miller, The nist definition of cloud computing http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf 49 Outage in dublin knocks amazon, microsoft data centers offline, 2011.

B. D. Payne and W. Lee, Secure and Flexible Monitoring of Virtual Machines, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.385-397, 2007.
DOI : 10.1109/ACSAC.2007.10

M. Pollitt, Blue Skies and Storm Clouds, Journal of Digital Forensic Practice, vol.2, issue.2, pp.105-106, 2008.
DOI : 10.1080/15567280802047168

M. M. Pollitt, An Ad Hoc Review of Digital Forensic Models, Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'07), pp.43-54, 2007.
DOI : 10.1109/SADFE.2007.3

D. Reilly, C. Wren, and T. Berry, Cloud computing: Forensic challenges for law enforcement, Proceedings of International Conference for Internet Technology and Secured Transactions ICITST 2010, pp.1-7, 2010.

G. G. Richard and V. Roussev, Next-generation digital forensics, Communications of the ACM, vol.49, issue.2, pp.76-80, 2006.
DOI : 10.1145/1113034.1113074

V. Roussev and G. G. Richard, Breaking the performance wall: The case for distributed digital forensics, Proceedings of the 2004 Digital Forensics Research Workshop, 2004.

V. Roussev, L. Wang, G. G. Richard, and L. Marziale, Mmr: A platform for largescale forensic computing, Proceedings of the Fifth Annual IFIP WG 11.9 International Conference on Digital Forensics, 2009.

K. Ruan, I. Baggili, J. Carthy, and T. Kechadi, Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis, Proceedings of the 2011 ADFSL Conference on Digital Forensics, 2011.
DOI : 10.1016/j.diin.2013.02.004

K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, Cloud Forensics, ) 59. Starcher, G.: Accessdata dna & amazon ec2, pp.35-49, 2011.
DOI : 10.1007/978-3-642-24212-0_3

URL : https://hal.archives-ouvertes.fr/hal-01523714

J. Talbot and R. Yoo, The phoenix system for mapreduce programming, 2011.

M. Taylor, J. Haggerty, D. Gresty, and R. Hegarty, Digital evidence in cloud computing systems, Computer Law & Security Review, vol.26, issue.3, pp.304-308, 2010.
DOI : 10.1016/j.clsr.2010.03.002

M. Taylor, J. Haggerty, D. Gresty, and D. Lamb, Forensic investigation of cloud computing systems, Network Security, vol.2011, issue.3, pp.4-10, 2011.
DOI : 10.1016/S1353-4858(11)70024-1

K. Wang, Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet, Advances in Digital Forensics VI, IFIP Advances in Information and Communication Technology, pp.37-48
DOI : 10.1007/978-3-642-15506-2_3

URL : https://hal.archives-ouvertes.fr/hal-01060608

Y. Wang, J. Cannady, and J. Rosenbluth, Foundations of computer forensics: A technology for the fight against computer crime, Computer Law & Security Review, vol.21, issue.2, pp.119-127, 2005.
DOI : 10.1016/j.clsr.2005.02.007

S. D. Wolthusen, Overcast: Forensic Discovery in Cloud Environments, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics, pp.3-9, 2009.
DOI : 10.1109/IMF.2009.21

S. Zimmerman and D. Glavach, Cyber forensics in the cloud, the newsletter for information assurance technology professionals, 2011.

A. Zonenberg, Distributed hash cracker: A cross-platform gpu-accelerated password recovery system, 2009.