Digital Forensic Challenges in the Cloud Computing Environment

被引:2
作者
Samy, Ganthan Narayana [1 ]
Shanmugam, Bharanidharan [2 ]
Maarop, Nurazean [1 ]
Magalingam, Pritheega [1 ]
Perumal, Sundresan [3 ]
Albakri, Sameer Hasan [1 ]
机构
[1] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Charles Darwin Univ, Sch Engn & Informat Technol, Casuarina, Australia
[3] Univ Sains Islam Malaysia, Fac Sci & Technol, Nilai, Malaysia
来源
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY | 2018年 / 5卷
关键词
Digital forensics; Cloud computing environment; Cloud computing forensics;
D O I
10.1007/978-3-319-59427-9_69
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing model has been developed with promises to overcome the difficulties of other computing models. The low cost of computing resources, availability, location independence, and more focus on business objectives that this model promises are the most attractive features for companies. However, security issues are still the main obstacle that prevent widespread cloud computing adaptation. Digital forensics, a necessary process after any security incident, is faced with many challenges in the cloud computing environment. In this paper, we discuss the challenges digital forensics face in a cloud computing environment.
引用
收藏
页码:669 / 676
页数:8
相关论文
共 50 条
[31]   Cloud Computing Reference Architecture and Its Forensic Implications: A Preliminary Analysis [J].
Ruan, Keyun ;
Carthy, Joe .
DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2012, 2013, 114 :1-21
[32]   Digital Forensic Evidence Collection of Cloud Storage Data for Investigation [J].
Easwaramoorthy, Sathishkumar ;
Thamburasa, Sankar ;
Samy, Guru ;
Bhushan, S. Bharath ;
Aravind, Karrothu .
2016 5TH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2016,
[33]   A digital forensic model for providing better data provenance in the cloud [J].
Trenwith, Philip M. ;
Venter, Hein S. .
2014 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2014,
[34]   Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation [J].
Dlamini, Moses ;
Venter, Hein ;
Eloff, Jan ;
Eloff, Mariki .
PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, :242-250
[35]   Analysis of Digital Investigation Techniques in Cloud Computing Paradigm [J].
Khan, M. N. A. ;
Ullah, Shah Wali ;
Khan, Abdul Rahman ;
Khan, Khalid .
INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2018, 9 (03) :251-259
[36]   Tokenization Based Service Model for Cloud Computing Environment [J].
Paul, Shreya ;
Singh, Atma Prakash ;
Ahmad, Shafeeq .
2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 3, 2015, :116-122
[37]   Attribute-based Encryption in Cloud Computing Environment [J].
Yan, Yuping ;
Alshawki, Mohammed B. ;
Ligeti, Peter .
2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, :63-68
[38]   Anomaly Detection for Nodes Under the Cloud Computing Environment [J].
Lei, Yang ;
Jiang, Ying .
INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2021, 12 (01) :30-48
[39]   Resource management model based on cloud computing environment [J].
Kim, Ahyoung ;
Lee, Junwoo ;
Kim, Mucheol .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016, 12 (11)
[40]   Applied Analysis of Open Course in the Cloud Computing Environment [J].
Miao Guoxin .
PROCEEDINGS OF THE SIXTH NORTHEAST ASIA INTERNATIONAL SYMPOSIUM ON LANGUAGE, LITERATURE AND TRANSLATION, 2017, :644-648