Analysis of Digital Investigation Techniques in Cloud Computing Paradigm

被引:3
|
作者
Khan, M. N. A. [1 ]
Ullah, Shah Wali [1 ]
Khan, Abdul Rahman [1 ]
Khan, Khalid [1 ]
机构
[1] Shaheed Zulfikar Ali Bhutto Inst Sci & Technol, Islamabad, Pakistan
关键词
Cloud Computing; Digital Forensics; Cloud Forensics; Network Forensics; Forensics as a Service;
D O I
10.15520/ijcrr/2018/9/06/525
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data security has always been the most essential aspect of computing. Many users when connected on the cloud do not know that they could be victim of cybercrime. Cloud computing being a mega network spread globally, majority of cloud users mostly use it to benefit from the availability of mass storage. Due to increasing use of storage services, it is possible for malicious users to misuse cloud storage services. Cloud computing is flourishing at a greater speed and likewise security risks on cloud are also increasing day by day. A key challenge of cloud forensics is that the cloud service providers have not yet established forensic capabilities to support investigations in case of a digital compromise. Cloud Forensics has three dimensions: technical, organizational and legal. Technical Dimension includes tools required to perform forensic investigations, proactive measures, data collection, data labeling and evidence segregation. Evidentiary data collection in cloud environment is another main challenge as it is stored at providers and customers end. Organizational dimension is not only restricted to cloud providers and customers, but it widens when providers outsource their services to third parties. Legal dimension covers SLAs and jurisdiction issues to ensure data security. A critical evaluation of digital forensic investigations of cloud storage services is necessary to determine key challenges associated to this field. The focus of this study is to explore various digital forensic analysis approaches that facilitate speedy and authentic analysis of the incriminating activities happened on the cloud environment. In this study, we have evaluated different cloud forensics frameworks and techniques and have identified main key challenges related to cloud forensics. The study findings are reported herein.
引用
收藏
页码:251 / 259
页数:9
相关论文
共 50 条
  • [41] Cloud Computing: Retro Revival or the New Paradigm?
    Bean, LuAnn
    JOURNAL OF CORPORATE ACCOUNTING AND FINANCE, 2010, 21 (05): : 9 - 14
  • [42] Cognitive security paradigm for cloud computing applications
    Ogiela, Lidia
    Ogiela, Marek R.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (08):
  • [43] GPGPU Cloud: A Paradigm for General Purpose Computing
    Hu, Liang
    Che, Xilong
    Xie, Zhenzhen
    TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (01) : 22 - 33
  • [44] Security Concerns and Countermeasures in Cloud Computing Paradigm
    Kumari, Meena
    Nath, Rajender
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 534 - 540
  • [45] An Investigation on Applications of Cloud Computing in Scientific Computing
    Chen, Huiying
    Wang, Feng
    Deng, Hui
    INFORMATION AND MANAGEMENT ENGINEERING, PT V, 2011, 235 : 201 - 206
  • [46] Soft computing techniques for big data and cloud computing
    B. B. Gupta
    Dharma P. Agrawal
    Shingo Yamaguchi
    Michael Sheng
    Soft Computing, 2020, 24 : 5483 - 5484
  • [47] Soft computing techniques for big data and cloud computing
    Gupta, B. B.
    Agrawal, Dharma P.
    Yamaguchi, Shingo
    Sheng, Michael
    SOFT COMPUTING, 2020, 24 (08) : 5483 - 5484
  • [48] Security Techniques for Cloud Computing Environment
    Garg, Prachi
    Goel, Sandeep
    Sharma, Avinash
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 771 - 776
  • [49] A Review of Green Cloud Computing Techniques
    Naji, Hala Zineb
    Zbakh, Mostapha
    Munir, Kashif
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 264 - 283
  • [50] Disaster Recovery Techniques in Cloud Computing
    Tamimi, Abdelfatah A.
    Dawood, Raneem
    Sadaqa, Lana
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 845 - 850