Full Paper View Go Back

Cloud Forensics: An Overall Research Perspective

M. Patidar1 , P. Bansal2

1 Department of Information Technology, Institute of Engineering and Technology (DAVV), Indore, India.
2 Department of Information Technology, Institute of Engineering and Technology (DAVV), Indore, India.

Section:Review Paper, Product Type: Journal
Vol.6 , Issue.2 , pp.5-10, Apr-2018


CrossRef-DOI:   https://doi.org/10.26438/ijsrnsc/v6i2.510


Online published on Apr 30, 2018


Copyright © M. Patidar, P. Bansal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Patidar, P. Bansal, “Cloud Forensics: An Overall Research Perspective,” International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.2, pp.5-10, 2018.

MLA Style Citation: M. Patidar, P. Bansal "Cloud Forensics: An Overall Research Perspective." International Journal of Scientific Research in Network Security and Communication 6.2 (2018): 5-10.

APA Style Citation: M. Patidar, P. Bansal, (2018). Cloud Forensics: An Overall Research Perspective. International Journal of Scientific Research in Network Security and Communication, 6(2), 5-10.

BibTex Style Citation:
@article{Patidar_2018,
author = {M. Patidar, P. Bansal},
title = {Cloud Forensics: An Overall Research Perspective},
journal = {International Journal of Scientific Research in Network Security and Communication},
issue_date = {4 2018},
volume = {6},
Issue = {2},
month = {4},
year = {2018},
issn = {2347-2693},
pages = {5-10},
url = {https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=318},
doi = {https://doi.org/10.26438/ijcse/v6i2.510}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i2.510}
UR - https://www.isroset.org/journal/IJSRNSC/full_paper_view.php?paper_id=318
TI - Cloud Forensics: An Overall Research Perspective
T2 - International Journal of Scientific Research in Network Security and Communication
AU - M. Patidar, P. Bansal
PY - 2018
DA - 2018/04/30
PB - IJCSE, Indore, INDIA
SP - 5-10
IS - 2
VL - 6
SN - 2347-2693
ER -

1890 Views    860 Downloads    363 Downloads
  
  

Abstract :
We are aware that Cloud Computing evolves as a transformative and potentially helpful field for future generations on account of its several economic benefits in every domain including commercial, public, governmental, organizational etc. However on account of increase in the digital crimes and a number of security threats over the cloud environment, works related with investigations over the cloud, recovering of evidence and systematic forensics methodologies need to be focused upon. Cloud Forensics is a relevant field that works on all of these issues. This paper gives an overall research perspective of Cloud Forensics including its overview, need, process, challenges, logging measures and forensic tools. With the help of certain forensic tools, cloud investigation processes have been eased. On the other hand, there are certain challenges encountered in the cloud forensics domain. The paper also gives an insight regarding the broad future scope and areas associated with the Cloud Forensics area.

Key-Words / Index Term :
Digital Forensics; Cloud Computing; Security; Cloud Forensics, Logs, Digital Investigation

References :
[1] A. Ghafarian, "Forensics analysis of cloud computing services." In IEEE Science and Information Conference (SAI), 2015, pp. 1335-1339, 2015.
[2] S. Alqahtany, N. Clarke, S. Furnell, and C. Reich. "Cloud forensics: a review of challenges, solutions and open problems." In Cloud Computing (ICCC), 2015 IEEE International Conference on pp. 1-9, 2015.
[3] D. Shirkhedkari, and S. Patil. "Design of digital forensic technique for cloud computing." International Journal of Advanced Research in Computer Science and Management Studies 2, no. 6, 2014.
[4] B. Sumitra, C. R. Pethuru, and M. Misbahuddin. "A survey of cloud authentication attacks and solution approaches." International journal of innovative research in computer and communication engineering 2, no. 10,pp. 6245-6253, 2014.
[5] S. Simou, C. Kalloniatis, E. Kavakli, and S. Gritzalis. "Cloud forensics: identifying the major issues and challenges." In Springer, International Conference on Advanced Information Systems Engineering, pp. 271-284., Cham, 2014.
[6] K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie. "Cloud forensics." In Springer, IFIP International Conference on Digital Forensics, pp. 35-46, Berlin Heidelberg, 2011.
[7] R. Marty, "Cloud application logging for forensics." In ACM, Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 178-184., 2011.
[8] D.R. Rani, and G. Geethakumari. "A meta-analysis of cloud forensic frameworks and tools." In IEEE, Power Control, Communication and Computational Technologies for Sustainable Growth (PCCCTSG), 2015 Conference on pp. 294-298., 2015.
[9] S. Kathuria, “A Survey on Security Provided by Multi-Clouds in Cloud Computing” In International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, pp.23-27, 2018.
[10] E.Casey, “Digital evidence and computer crime: Forensic science, computers, and the internet.”,USA, Academic press, Elsevier Inc Publication, pp 189-190, 2011.
[11] D.Lillis, Brett Becker, Tadhg OSullivan, and Mark Scanlon. "Current challenges and future research areas for digital forensic investigation." In Annual ADFSL Conference on Digital Forensics, Security and Law, 2016.
[12] A.Burney, M.Asif, and Z.Abbas. "Forensics Issues in Cloud Computing." In Journal of Computer and Communications 4, no. 10,2016.
[13] T. Sang, "A log-based approach to make digital forensics easier on cloud computing." In IEEE Intelligent System Design and Engineering Applications (ISDEA), 2013 Third International Conference on, pp. 91-94., 2013.
[14] S.Thorpe, T. Grandison, and I. Ray. "Cloud Computing Log Evidence Forensic Examination Analysis." In Proceedings of the 2nd International Conference on Cybercrime, Security and Digital Forensics, 2012.
[15] S. Naaz and F. A. Siddiqui. "Comparative Study of Cloud Forensics Tools." In Communications on Applied Electronics (CAE) ISSN: 2394-4714.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at ijsrnsc@gmail.com or view contact page for more details.

Impact Factor

Journals Contents

Information

Downloads

Digital Certificate

Go to Navigation