Analysis of Cloud Forensics : Review and Impact on Digital Forensics Aspects

Authors

  • Mamta Khanchandani  Assistant Professor, C. B. Patel Computer College, V.N.S.G.U., Surat, Gujarat, India
  • Dr. Nirali Dave  Associate Professor, BMCCA (BMU), Surat, Gujarat, India

DOI:

https://doi.org/10.32628/IJSRST2182118

Keywords:

Cyber Crime, Digital Forensic, Network Forensic, Cloud Forensics.

Abstract

Digital forensics is the science of finding evidence to digital crimes and attacks. Cloud Forensics is a part of Digital Forensics that watches over the crime that has taken place over the cloud and carries out an investigation on it. Cloud computing is an evolutionary technology based on a huge network, which spreads globally. Hence, Cloud Forensics is a part of Network Forensics, which in turn is a part of Digital Forensics. Cloud organizations along with the providers of cloud service and customers that uses cloud service, are still awaiting the establishment of an explicit forensic revolution. Without the much-needed forensic capability, they will not be able to safeguard the robustness of their system and suitability of their services that assist criminal and cybercrime investigations. In this paper, we review the forensic process, challenges in cloud forensics, and its impact on digital forensics.

References

  1. NIST Cloud Computing Forensic Science Working Group. Nist cloud computing forensic science challenges. No. NIST Internal or Interagency Report (NISTIR) 8006 (Draft). National Institute of Standards and Technology, 2014.
  2. Al Sadi, Ghania. "Cloud computing architecture and forensic investigation challenges." International Journal of Computer Applications 124.7 (2015).
  3. Zawoad, Shams, and Ragib Hasan. Digital forensics in the cloud. ALABAMA UNIV IN BIRMINGHAM, 2013..
  4. Geetha, Vaithianathan. "About cloud forensics: Challenges and solutions." The International Journal of Distributed and Cloud Computing 3 (2015).
  5. Neware, Rahul, and Amreen Khan. "Cloud Computing Digital Forensic challenges." 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2018.
  6. Ahmed, Irfan, and Vassil Roussev. "Analysis of Cloud Digital Evidence." Security, Privacy, and Digital Forensics in the Cloud (2019): 301.
  7. Muhammad Ubaid Ullah, Raja, et al. "The challenges of cloud computing in forensic science." International Journal of Computer Trends and Technology (IJCTT) 67.7 (2019): 40-48.
  8. Haimbala, Joolokeni. Avoiding dark cloud: Secure storage and trusted computing. Diss. Ph. D. Thesis, University of Westminster, 2016, 73p, 2016.
  9. Arafat, Md Yasir, Bipasha Mondal, and Sreeti Rani. "Technical challenges of cloud forensics and suggested solutions." Int. J. Sci. Eng. Res. 8.8 (2017): 1142-1149.
  10. Sharevski, Filipo. "Digital forensic investigation in cloud computing environment: impact on privacy." 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE). IEEE, 2013.
  11. Ruan, Keyun, et al. "Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results." Digital Investigation 10.1 (2013): 34-43.
  12. O’shaughnessy, Stephen, and Anthony Keane. "Impact of cloud computing on digital forensic investigations." Ifip international conference on digital forensics. Springer, Berlin, Heidelberg, 2013.
  13. Ruan, Keyun, et al. "Cloud forensics." IFIP International Conference on Digital Forensics. Springer, Berlin, Heidelberg, 2011.
  14. Miranda Lopez, Erik, Seo Yeon Moon, and Jong Hyuk Park. "Scenario-based digital forensics challenges in cloud computing." Symmetry 8.10 (2016): 107.
  15. Kulkarni, G., et al. "Mobile cloud computing: security threats." International Conference on Electronics and Communication Systems. 2014.
  16. Wu, Xu. "Context-aware cloud service selection model for mobile cloud computing environments." Wireless Communications and Mobile Computing 2018 (2018).
  17. Wang, Ping, et al. "Clustering-Based Emotion Recognition Micro-Service Cloud Framework for Mobile Computing." IEEE Access 8 (2020): 49695-49704.
  18. Djemame, Karim, et al. "Paas-iaas inter-layer adaptation in an energy-aware cloud environment." IEEE Transactions on Sustainable Computing 2.2 (2017): 127-139.
  19. Li, Yibin, et al. "Intelligent cryptography approach for secure distributed big data storage in cloud computing." Information Sciences 387 (2017): 103-115.
  20. Li, Yibin, et al. "Intelligent cryptography approach for secure distributed big data storage in cloud computing." Information Sciences 387 (2017): 103-115.
  21. Agarkhed, Jayashree, and R. Ashalatha. "An efficient auditing scheme for data storage security in cloud." 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT). IEEE, 2017.

Downloads

Published

2021-04-30

Issue

Section

Research Articles

How to Cite

[1]
Mamta Khanchandani, Dr. Nirali Dave "Analysis of Cloud Forensics : Review and Impact on Digital Forensics Aspects" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 8, Issue 2, pp.639-646, March-April-2021. Available at doi : https://doi.org/10.32628/IJSRST2182118