A Study of Cloud Forensics: Technical Issues, Challenges, Tools and Technologies

Kalyan Bamane, Dinesha H. A


Cloud Forensics is a blend of Cloud Computing and
Digital/Cyber Forensics innovation. Cloud Forensics is essentially
an application inside a Digital Forensics which oversees the
assault and crime happened over the cloud and investigates on
it. Cloud computing is executes on wide system, which spreads
around the world. Subsequently, Cloud Forensics can be seen as
a subset of Network Forensics. The center procedure still stays
as the digital forensic examination of system. In any case, when
the information is erased or modified, it turns into the essential
wellspring of proof in advanced legal sciences. In Cloud Forensics,
it will be a test to recuperate the erased information, recognize
information proprietor, and utilize those information for recovery.
The cloud service providers (CSPs) and the clients still can’t
seem to actualize cloud legal abilities which will bolster the
investigation on the off chance that if any assault is occurred or
information hack happens. This execution requires fundamental
comprehension of cloud forensic issues, difficulties, tools and
innovations which are projected to in this paper.

Full Text:



Almulla, S., Iraqi, Y. and Jones, A. (2013). Cloud forensics: A research

perspective. In 9th International Conference on Innovations in Information

Technology (IIT). Abu Dhabi: Ieee, pp.6671.

W3C Document Object Model (DOM), [Online]. Available: http://www.


Birk, D. (2011). Technical Challenges of Forensic Investigations in Cloud

Computing Environments. , pp.16.

Grispos, G., Glisson, W. and Storer, T. (2011). Calm before the Storm:

The Emerging Challenges of Cloud Computing in Digital Forensics.

dcs.gla.ac.uk, pp.138. [online].

Guo, H., Jin, B. and Shang, T. (2012). Forensic Investigations in Cloud

Environments. In 2012International Conference on Computer Science and

Information Processing ( CSIP). Xian,Shaanxi: Ieee, pp. 248251.

IDC. (2010). IDC eXchange Blog Archive New IDC IT Cloud

Services Survey: Top Benefits and Challenges. [online]. Available from:

http://blogs.idc.com/ie/?p=730 [Accessed July 22,2013].

Josshua, G. (2012). Protection in the cloud: Risk management and

insurance for cloud computing. Internet Law, 15(12).

7.Mell, P. and Grance, T. (2011). The NIST Definition of Cloud

Computing, Recommendations ofthe National Institute of Standards and

Technolog. Gaithersburg, MD. [online]. Available from:

8.Ruan, K. et al. (2011). Cloud forensics : An overview. IBM Ireland

Ltd, pp.116.

9.Ruan, K. and Carthy, J. (2012). Cloud Forensic Maturity Model. In

Digital Forensics and CyberCrime. Springer Berlin Heidelberg, pp. 2241.

10.Trenwith, P.M. and Venter, H. (2013). Digital Forensic Readiness in

the Cloud. In InformationSecurity for South Africa, 2013. pp. 15.

11.Zawoad, S. and Hasan, R. (2013). Cloud Forensics: A Meta-Study of

Challenges, Approaches,and Open Problems. Cryptography and Security,


Josiah Dykstra and Alan T. Sherman, Design and Implementation of

FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform,

Cyber Defense Lab, Department of CSEE University of Maryland,

Baltimore County (UMBC), April 2013.

Josiah Dykstra and Alan T. Sherman, Understanding Issues In Cloud

Forensics: Two Hypothetical Case Studies, ADFSL Conference on Digital

Forensics, Security and Law, 2011.

Cellebrite, Extracting Legally Defensible Evidence From The Cloud,

Explaining UFED Cloud Analyzer Extraction and Analysis Processes.

Cellebrite, UFED Cloud Analyser UFED-Cloud- Analyzer-

DataSheet.pdf www.cellebrite.com/Mobile- Forensics/Products/ufedcloud-



  • There are currently no refbacks.

Copyright © IJETT, International Journal on Emerging Trends in Technology