Review on Cloud Forensics: An Open Discussion on Challenges and Capabilities (original) (raw)
Related papers
Review of Cloud Forensics: Challenges, Solutions and Comparative Analysis
IJCA, 2019
Every technology has some benefits and some limitations. Cloud computing has its own set of them. Cloud computing has various advantages i.e. reliability, cost effective, scalability, fault tolerance, backup. But there are also some security issues in cloud computing because data is stored on worldwide platform. Many attackers can use cloud services to create vulnerability in the cloud system. There are some forensics tools implemented to find information about these attacks in cloud environment. This complete process to find evidence in cloud environment is known as cloud forensics. This paper presents a study about cloud forensics methods, technology used, comparative study to provide awareness of tools, methods, challenges in cloud forensics. This information will help to find new techniques to improve forensics process in cloud forensics.
An Approach Towards Digital Forensic Framework for Cloud
Cloud Computing is on demand network, data access anywhere anytime. Pay per model is gaining commercial day by day. Due to the popularity of cloud and all time availability, the security issue is again the main concern nowadays. The client don't know where the data is stored and in which datacenter. The distributed nature of cloud is again the point of security in cloud and also gives the chance to malicious activities to be carried out very easily. Cloud computing presents the abstract layer to user for storing their confidential data hiding their architectural details. Due to this whenever the malicious activity happens in cloud, it becomes very difficult to trace. This gives rise to new area of research in the field of digital forensics that has unique challenges and opportunities in context of cloud. This paper presents the detail study of malicious activity that can be carried out in cloud and with the help of some case studies and detailed methodology of proposed architecture earlier mentioned in the paper.
International Journal of Advanced Research in Computer Science, 2017
Cloud computing is evolving web based technology. Which provide various service to physical IT infrastructure which is managed and hosted by third party. Features due to which cloud find its application in E-learning, cloud based ERP and Egovernance are flexibility, availability, scalability, efficiency and reliability. As large number of computing technology is involved in cloud computing it is an object of security issues. In this research, we have discussed about basics of cloud computing, features, models, application, security issue, basics of digital forensics and cloud forensic as well as the challenges faced during the cloud investigation.
A Review of Cloud Forensics Issues & Challenges
Cloud Computing is becoming most sought after and desired service among organizations as it can share entities such as, process units, storage and software and promises simplicity and delivering services based on virtualization technologies. Convenience, availability, elasticity, speed, large storage capacity, scalability, and on-demand network access are some of the key features of cloud computing. The surge in adoption of cloud computing solutions makes it inevitable for digital forensics not to follow since considerable & extensive potential security risks girdle this new technology. This paper provides a review of cloud forensics including the issues and existing challenges in order to give better future prospects and also offers some steps to be taken to overcome these challenges.
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Computing is a heavily evolving domain in technology. Many public and private entities are shifting their workstations on the cloud due to its robust, remote, virtual environment. Due to the enormity of this domain, it has become increasingly easier to carry out any sort of malicious attacks on such cloud platforms. There is a very low research done to develop the theory and practice of cloud forensics. One of the main challenges includes the inability to collect enough evidence from each and every subscriber of a Cloud Service Provider(CSP) and thus not being able to trace out the roots of the malicious activity committed. In this paper we compare past research done in this field and address the gaps and loopholes in the frameworks previously suggested. Overcoming these, our system/framework facilitates the collection, organization, and thereby the analysis of the evidence sought, hence preserving the essential integrity of the sensitive and volatile data.
Forensics Issues in Cloud Computing
Journal of Computer and Communications, 2016
Cloud computing is an emerging technology that is being widely adopted throughout the world due to its ease-of-use. Organizations of all types can use it without prerequisites such as IT infrastructure, technical skills, managerial overload, storage capacity, processing power, and data recovery or privacy setup. It can be availed by all clients as per their needs, expectations and budget. However, cloud computing introduces new kinds of security vulnerabilities that need to be addressed. Traditional "Computer Forensics" deals with detection, preemption and prevention of IT triggered frauds and crimes but it lacks the ability to deal with cybercrimes pertaining to cloud computing environment. In this paper, we focus on forensics issues in cloud computing, assess limitations of forensic team and present the obstacles faced during investigation.
Cloud Forensics: Identifying the Major Issues and Challenges
One of the most important areas in the developing field of cloud computing is the way that investigators conduct researches in order to reveal the ways that a digital crime took place over the cloud. This area is known as cloud forensics. While great research on digital forensics has been carried out, the current digital forensic models and frameworks used to conduct a digital investigation don’t meet the requirements and standards demanded in cloud forensics due to the nature and characteristics of cloud computing. In parallel, issues and challenges faced in traditional forensics are different to the ones of cloud forensics. This paper addresses the issues of the cloud forensics challenges identified from review conducted in the respective area and moves to a new model assigning the aforementioned challenges to stages.
Cloud Forensics: An Overall Research Perspective
International Journal of Scientific Research in Network Security and Communication, 2018
We are aware that Cloud Computing evolves as a transformative and potentially helpful field for future generations on account of its several economic benefits in every domain including commercial, public, governmental, organizational etc. However on account of increase in the digital crimes and a number of security threats over the cloud environment, works related with investigations over the cloud, recovering of evidence and systematic forensics methodologies need to be focused upon. Cloud Forensics is a relevant field that works on all of these issues. This paper gives an overall research perspective of Cloud Forensics including its overview, need, process, challenges, logging measures and forensic tools. With the help of certain forensic tools, cloud investigation processes have been eased. On the other hand, there are certain challenges encountered in the cloud forensics domain. The paper also gives an insight regarding the broad future scope and areas associated with the Cloud Forensics area.
A novel approach of cloud computing security using forensics techniques
Using cloud computing, businesses can adopt IT without incurring a significant upfront cost. The Internet has numerous benefits, but model security remains a concern, which affects cloud embracing negatively. The security challenge gets too difficult underneath data center, while additional dimensions such as model design, multitenancy, elasticity, and the layers dependency stack have been added to the problem scope. We present a thorough examination of the cloud security challenge in this article. We looked at the issue from the standpoints of network infrastructure: cloud-provided features, cloud consumers, and cloud service delivery methods. Based on this research, we developed an in-depth characterization of the data protection challenge and recommended security solutions that should address the critical aspects of the issue. Cloud computing is an exploding field of research that relies on distributing computing power instead of using dedicated computers or smart devices. Most of the growth in this sector is attributed to the indispensability of electronic and digital gadgets and the shift from a traditional IT subscription model to a unique cloud model. Cloud computing offered a significant danger and difficulty for information system projects, but it also provided them with several possibilities to improve their data processing. It has also been noted that cloud users and consumers do not yet have the necessary forensic skills to detect illegal activity in the cloud. Although the cloud offers potential technological and economic advantages, consumers have been reluctant to adopt it primarily due to security concerns and the difficulty of conducting an appropriate investigation into the cloud. Some study has been done in this area, and strategies for conducting forensic investigations have been proposed. In this research paper, we begin by analyzing the intrusion detection progress made by other academics, and then we analyze and evaluate our conclusions in order to assess the potential difficulties that cloud forensics face based on these findings.
Forensics framework for cloud computing
Computers & Electrical Engineering, 2017
The popularity of cloud computing has been on the rise in recent years, as cloud resources are not only shared by many users but can be allocated on demand. A recent survey reports success of the cyber criminals in using cloud computing technology for fraudulent activities, due to its essential characteristics and the lack of suitable digital forensic techniques for the cloud environment. While mitigating cloud crime, investigators face several challenges and issues dealing with cloud forensics. In this paper, the challenges faced by forensic investigators are highlighted. Most of the research work deals with the identification of challenges in cloud forensics and the proposed solutions reported in literature depends on Cloud Service Provider (CSP) for forensic investigation. The dependence on CSP includes the collection of data for the forensics process and there may be a chance of altering data that affects the entire investigation process. For mitigating the dependency on CSP, a new model for collecting forensic evidence outside the cloud environment is developed.