ISSN 2321-3256 (Electronic Version)  
IJSRNSC News
Journal Contents
Current Issue
Archive Issues
Special Issues
Best Paper Award
IJSRNSC Guidelines
Author Guidelines
Editors Guidelines
Reviewer Guidelines
Research Areas
Process & Policies
Peer-Review Process
Plagiarism Policy
Correction Policy
Ethics and Malpractice
 Digital Certificate
       
    Regular Issues Certificate
    Special Issue Certificate
       
 Download
       
    IJSRNSC Template
    Copyright Transfer Form
    Originality Certificate
       
FAQs
 
Full Paper View
Open Access   Article

Cloud Forensics: An Overall Research Perspective
M. Patidar1 , P. Bansal2
1 Department of Information Technology, Institute of Engineering and Technology (DAVV), Indore, India.
2 Department of Information Technology, Institute of Engineering and Technology (DAVV), Indore, India.
Section:Review Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.5-10, Apr-2018

CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i2.510

Online published on Apr 30, 2018
Copyright © M. Patidar, P. Bansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 
View this paper at   Google Scholar | DPI Digital Library
  XML View PDF Download  
Citation :
IEEE Style Citation: M. Patidar, P. Bansal, “Cloud Forensics: An Overall Research Perspective”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.5-10, 2018.

MLA Style Citation: M. Patidar, P. Bansal "Cloud Forensics: An Overall Research Perspective." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 5-10.

APA Style Citation: M. Patidar, P. Bansal, (2018). Cloud Forensics: An Overall Research Perspective. International Journal of Scientific Research in Network Security and Communication, 6(2), 5-10.
           
1 Views    1 Downloads    1 Downloads
Abstract :
We are aware that Cloud Computing evolves as a transformative and potentially helpful field for future generations on account of its several economic benefits in every domain including commercial, public, governmental, organizational etc. However on account of increase in the digital crimes and a number of security threats over the cloud environment, works related with investigations over the cloud, recovering of evidence and systematic forensics methodologies need to be focused upon. Cloud Forensics is a relevant field that works on all of these issues. This paper gives an overall research perspective of Cloud Forensics including its overview, need, process, challenges, logging measures and forensic tools. With the help of certain forensic tools, cloud investigation processes have been eased. On the other hand, there are certain challenges encountered in the cloud forensics domain. The paper also gives an insight regarding the broad future scope and areas associated with the Cloud Forensics area.
Key-Words / Index Term :
Digital Forensics; Cloud Computing; Security; Cloud Forensics, Logs, Digital Investigation
References :
[1] A. Ghafarian, "Forensics analysis of cloud computing services." In IEEE Science and Information Conference (SAI), 2015, pp. 1335-1339, 2015.
[2] S. Alqahtany, N. Clarke, S. Furnell, and C. Reich. "Cloud forensics: a review of challenges, solutions and open problems." In Cloud Computing (ICCC), 2015 IEEE International Conference on pp. 1-9, 2015.
[3] D. Shirkhedkari, and S. Patil. "Design of digital forensic technique for cloud computing." International Journal of Advanced Research in Computer Science and Management Studies 2, no. 6, 2014.
[4] B. Sumitra, C. R. Pethuru, and M. Misbahuddin. "A survey of cloud authentication attacks and solution approaches." International journal of innovative research in computer and communication engineering 2, no. 10,pp. 6245-6253, 2014.
[5] S. Simou, C. Kalloniatis, E. Kavakli, and S. Gritzalis. "Cloud forensics: identifying the major issues and challenges." In Springer, International Conference on Advanced Information Systems Engineering, pp. 271-284., Cham, 2014.
[6] K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie. "Cloud forensics." In Springer, IFIP International Conference on Digital Forensics, pp. 35-46, Berlin Heidelberg, 2011.
[7] R. Marty, "Cloud application logging for forensics." In ACM, Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 178-184., 2011.
[8] D.R. Rani, and G. Geethakumari. "A meta-analysis of cloud forensic frameworks and tools." In IEEE, Power Control, Communication and Computational Technologies for Sustainable Growth (PCCCTSG), 2015 Conference on pp. 294-298., 2015.
[9] S. Kathuria, “A Survey on Security Provided by Multi-Clouds in Cloud Computing” In International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.23-27, 2018.
[10] E.Casey, “Digital evidence and computer crime: Forensic science, computers, and the internet.”,USA, Academic press, Elsevier Inc Publication, pp 189-190, 2011.
[11] D.Lillis, Brett Becker, Tadhg OSullivan, and Mark Scanlon. "Current challenges and future research areas for digital forensic investigation." In Annual ADFSL Conference on Digital Forensics, Security and Law, 2016.
[12] A.Burney, M.Asif, and Z.Abbas. "Forensics Issues in Cloud Computing." In Journal of Computer and Communications 4, no. 10,2016.
[13] T. Sang, "A log-based approach to make digital forensics easier on cloud computing." In IEEE Intelligent System Design and Engineering Applications (ISDEA), 2013 Third International Conference on, pp. 91-94., 2013.
[14] S.Thorpe, T. Grandison, and I. Ray. "Cloud Computing Log Evidence Forensic Examination Analysis." In Proceedings of the 2nd International Conference on Cybercrime, Security and Digital Forensics, 2012.
[15] S. Naaz and F. A. Siddiqui. "Comparative Study of Cloud Forensics Tools." In Communications on Applied Electronics (CAE) ISSN: 2394-4714.
 
 
User Section
Login

If you do not have an account Click here for registration.
Email Id :   *
Password :   *
   
     
  Login 
     
New User?   Forgot Password
     
Authorization Required

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  submit@ijsrnsc.org or view contact page for more details.

 Journal Statistics
UGC J. No. 46614
Citations 070
h-index 004
i10-index 001
IF Valune 2.422
 
 
 
 
Call for Reviewer
     Home l Terms & Conditions l Privacy Policy l
    © E-ISSN: 2321-3256 Copyright © IJSRNSC
This work is licensed under: CC-BY-NC-ND 4.0