A Study of Cloud Forensics: Technical Issues, Challenges, Tools and Technologies
Abstract
Cloud Forensics is a blend of Cloud Computing and
Digital/Cyber Forensics innovation. Cloud Forensics is essentially
an application inside a Digital Forensics which oversees the
assault and crime happened over the cloud and investigates on
it. Cloud computing is executes on wide system, which spreads
around the world. Subsequently, Cloud Forensics can be seen as
a subset of Network Forensics. The center procedure still stays
as the digital forensic examination of system. In any case, when
the information is erased or modified, it turns into the essential
wellspring of proof in advanced legal sciences. In Cloud Forensics,
it will be a test to recuperate the erased information, recognize
information proprietor, and utilize those information for recovery.
The cloud service providers (CSPs) and the clients still can’t
seem to actualize cloud legal abilities which will bolster the
investigation on the off chance that if any assault is occurred or
information hack happens. This execution requires fundamental
comprehension of cloud forensic issues, difficulties, tools and
innovations which are projected to in this paper.
Full Text:
PDFReferences
Almulla, S., Iraqi, Y. and Jones, A. (2013). Cloud forensics: A research
perspective. In 9th International Conference on Innovations in Information
Technology (IIT). Abu Dhabi: Ieee, pp.6671.
W3C Document Object Model (DOM), [Online]. Available: http://www.
w3.org/DOM/.
Birk, D. (2011). Technical Challenges of Forensic Investigations in Cloud
Computing Environments. , pp.16.
Grispos, G., Glisson, W. and Storer, T. (2011). Calm before the Storm:
The Emerging Challenges of Cloud Computing in Digital Forensics.
dcs.gla.ac.uk, pp.138. [online].
Guo, H., Jin, B. and Shang, T. (2012). Forensic Investigations in Cloud
Environments. In 2012International Conference on Computer Science and
Information Processing ( CSIP). Xian,Shaanxi: Ieee, pp. 248251.
IDC. (2010). IDC eXchange Blog Archive New IDC IT Cloud
Services Survey: Top Benefits and Challenges. [online]. Available from:
http://blogs.idc.com/ie/?p=730 [Accessed July 22,2013].
Josshua, G. (2012). Protection in the cloud: Risk management and
insurance for cloud computing. Internet Law, 15(12).
7.Mell, P. and Grance, T. (2011). The NIST Definition of Cloud
Computing, Recommendations ofthe National Institute of Standards and
Technolog. Gaithersburg, MD. [online]. Available from:
8.Ruan, K. et al. (2011). Cloud forensics : An overview. IBM Ireland
Ltd, pp.116.
9.Ruan, K. and Carthy, J. (2012). Cloud Forensic Maturity Model. In
Digital Forensics and CyberCrime. Springer Berlin Heidelberg, pp. 2241.
10.Trenwith, P.M. and Venter, H. (2013). Digital Forensic Readiness in
the Cloud. In InformationSecurity for South Africa, 2013. pp. 15.
11.Zawoad, S. and Hasan, R. (2013). Cloud Forensics: A Meta-Study of
Challenges, Approaches,and Open Problems. Cryptography and Security,
pp.115.
Josiah Dykstra and Alan T. Sherman, Design and Implementation of
FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform,
Cyber Defense Lab, Department of CSEE University of Maryland,
Baltimore County (UMBC), April 2013.
Josiah Dykstra and Alan T. Sherman, Understanding Issues In Cloud
Forensics: Two Hypothetical Case Studies, ADFSL Conference on Digital
Forensics, Security and Law, 2011.
Cellebrite, Extracting Legally Defensible Evidence From The Cloud,
Explaining UFED Cloud Analyzer Extraction and Analysis Processes.
Cellebrite, UFED Cloud Analyser UFED-Cloud- Analyzer-
DataSheet.pdf www.cellebrite.com/Mobile- Forensics/Products/ufedcloud-
analyzer
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology