CFP last date
20 May 2024
Reseach Article

Digital Forensics in Cloud Computing

by Archit Kapur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 18
Year of Publication: 2021
Authors: Archit Kapur
10.5120/ijca2021921524

Archit Kapur . Digital Forensics in Cloud Computing. International Journal of Computer Applications. 183, 18 ( Jul 2021), 10-13. DOI=10.5120/ijca2021921524

@article{ 10.5120/ijca2021921524,
author = { Archit Kapur },
title = { Digital Forensics in Cloud Computing },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2021 },
volume = { 183 },
number = { 18 },
month = { Jul },
year = { 2021 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number18/32024-2021921524/ },
doi = { 10.5120/ijca2021921524 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:17:08.934649+05:30
%A Archit Kapur
%T Digital Forensics in Cloud Computing
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 18
%P 10-13
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

For years, digital forensics has been used in computer crime investigations. It has changed and progressed in response to technological advances, and is currently entering a new phase as the concept of cloud computing is emerging. Cloud computing is a computing model that enables on-demand network access to a shared pool of configurable computing resources from anywhere in the world (e.g., networks, servers, storage, applications, and services). In the field of digital forensics, the concept of cloud computing has produced unique obstacles. This research paper aims to investigate the digital forensics issues in the model of cloud computing and provide the necessary solutions, guidelines. Traditional digital forensics and cloud computing are also covered in depth.

References
  1. NIST, "The NIST Definition of Cloud Computing," September 2011. [Online]. Available: https://csrc.nist.gov/publications/detail/sp/800-145/final.
  2. C. W. T. B. Denis Reilly, "Cloud Computing: Pros and Cons for Computer Forensic Investigations," March 2011. [Online]. Available: https://infonomics-society.org/wp-content/uploads/ijmip/published-papers/volume-1-2011/Cloud-Computing-Pros-Cons-for-Computer-Forensic-Investigations.pdf.
  3. "Digital Forensic Research Workshop, “A Roadmap for Digital Forensic Research“," 2001. [Online]. Available: https://www.oreilly.com/library/view/practical-forensic-imaging/9781492018049/xhtml/footnote.xhtml.
  4. "ISO/IEC 27037," 2012. [Online]. Available: https://www.iso.org/standard/44381.html.
  5. "NIST Cloud Computing Forensic Science Challenges," August 2020. [Online]. Available: https://csrc.nist.gov/publications/detail/nistir/8006/final.
  6. Novell, "Survey Finds Mixed Feelings On Cloud Computing Among IT Pros," [Online]. Available: https://www.netiq.com/docrep/documents/0h82v8pmt1/SurveyReport_CloudComputing_en.pdf.
  7. "Cloud Computing Security--Trends and Research Directions," July 2011. [Online]. Available: https://ieeexplore.ieee.org/document/6012787?signout=success.
  8. "NIST Cloud Computing Forensic Science Challenges," [Online]. Available: https://csrc.nist.gov/csrc/media/publications/nistir/8006/draft/documents/draft_nistir_8006.pdf.
  9. M. Damshenas, A. Dehghantanha, R. Mahmoud and S. b. Shamsuddin, "Forensics investigation challenges in cloud computing environments," July 2012. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/6246092.
  10. S. T. Rainer Poisel, "Discussion on the Challenges and Opportunities of Cloud Forensics," 2012. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-642-32498-7_45.
  11. D. Birk and C. Wegener, "Technical Issues of Forensic Investigations in Cloud Computing Environments," March 2012. [Online]. Available: https://ieeexplore.ieee.org/document/6159124.
  12. Y. D. P. Q. J. D. Guangxuan Chen, "Suggestions to digital forensics in Cloud computing ERA," 2012. [Online]. Available: https://ieeexplore.ieee.org/document/6418812.
  13. C. J. K. T. C. M. Ruan K, "Cloud forensics: an overview. In Advances in Digital Forensics VII, 7th IFIP WG 11.9 International Conference on Digital Forensics," [Online].
  14. D.-Y. Kao, "Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments," January 2016. [Online]. Available: https://dl.acm.org/doi/10.1007/s11227-015-1516-7.
  15. H. F. Sibiya G Venter, "Digital forensic framework for a cloud environment," May 2012. [Online]. Available: https://researchspace.csir.co.za/dspace/handle/10204/5890.
  16. K.-K. R. DarrenQuick, "Impacts of increasing volume of digital forensic data: A survey and future research challenges," December 2014. [Online]. Available: https://www.sciencedirect.com/science/article/abs/pii/S1742287614001066.
  17. U. D. D. Mills, "Network Time Protocol Version 4: Protocol and Algorithms Specification," June 2010. [Online]. Available: https://datatracker.ietf.org/doc/html/rfc5905.
  18. J. L. R. H. D. Zhiguo Wan, "HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing," April 2012. [Online]. Available: https://ieeexplore.ieee.org/document/6046132.
  19. R. Marty, "Cloud application logging for forensics," March 2011. [Online]. Available: https://dl.acm.org/doi/10.1145/1982185.1982226.
  20. R. Marty, "Cloud application logging for forensics," March 2011. [Online]. Available: https://dl.acm.org/doi/10.1145/1982185.1982226.
Index Terms

Computer Science
Information Sciences

Keywords

Digital Forensics Cloud Computing Security Cloud Forensics