Digital Forensic Challenges in the Cloud Computing Environment

被引:2
作者
Samy, Ganthan Narayana [1 ]
Shanmugam, Bharanidharan [2 ]
Maarop, Nurazean [1 ]
Magalingam, Pritheega [1 ]
Perumal, Sundresan [3 ]
Albakri, Sameer Hasan [1 ]
机构
[1] Univ Teknol Malaysia, Adv Informat Sch, Kuala Lumpur, Malaysia
[2] Charles Darwin Univ, Sch Engn & Informat Technol, Casuarina, Australia
[3] Univ Sains Islam Malaysia, Fac Sci & Technol, Nilai, Malaysia
来源
RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY | 2018年 / 5卷
关键词
Digital forensics; Cloud computing environment; Cloud computing forensics;
D O I
10.1007/978-3-319-59427-9_69
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cloud computing model has been developed with promises to overcome the difficulties of other computing models. The low cost of computing resources, availability, location independence, and more focus on business objectives that this model promises are the most attractive features for companies. However, security issues are still the main obstacle that prevent widespread cloud computing adaptation. Digital forensics, a necessary process after any security incident, is faced with many challenges in the cloud computing environment. In this paper, we discuss the challenges digital forensics face in a cloud computing environment.
引用
收藏
页码:669 / 676
页数:8
相关论文
共 50 条
[41]   A natural human language framework for digital forensic readiness in the public cloud [J].
Baror, Stacey O. ;
Venter, Hein S. ;
Adeyemi, Richard .
AUSTRALIAN JOURNAL OF FORENSIC SCIENCES, 2021, 53 (05) :566-591
[42]   REVERSIBLE HIDDEN DATA ACCESS ALGORITHM IN CLOUD COMPUTING ENVIRONMENT [J].
Xu, Jinsong .
DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES S, 2019, 12 (4-5) :1219-1232
[43]   Study on Investigation and Forensics by Computer under Cloud Computing Environment [J].
Sun Cui .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT, COMPUTER AND EDUCATION INFORMATIZATION, 2015, 25 :110-112
[44]   Distributed Multidimensional Data Indexing Strategy in Cloud Computing Environment [J].
He Dinghua .
2021 6TH INTERNATIONAL CONFERENCE ON SMART GRID AND ELECTRICAL AUTOMATION (ICSGEA 2021), 2021, :204-207
[45]   Dynamic access control of encrypted data in cloud computing environment [J].
Xiang S. ;
Zhu Z. .
International Journal of Performability Engineering, 2019, 15 (03) :969-976
[46]   EXPLORATION ON RESOURCE SCHEDULING OPTIMIZATION STRATEGIES IN CLOUD COMPUTING ENVIRONMENT [J].
Li, Xiaolan ;
Yang, Wenfu .
Scalable Computing, 2025, 26 (02) :973-982
[47]   Research on Key Technologies of Distributed Storage in Cloud Computing Environment [J].
Tao, Liu .
PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 :194-197
[48]   Accurate detection of user interest data in cloud computing environment [J].
Qiang Yu ;
Qi Liu .
Cluster Computing, 2019, 22 :1169-1178
[49]   Introducing the Information Security Management System in Cloud Computing Environment [J].
Tot, Laslo ;
Grubor, Gojko ;
Marta, Takacs .
ACTA POLYTECHNICA HUNGARICA, 2015, 12 (03) :147-166
[50]   Research into Synthesizing Access Control Strategies in Cloud Computing Environment [J].
Ni, Ping .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ELECTRONICS, MECHANICS, CULTURE AND MEDICINE, 2016, 45 :440-445