Corpus ID: 9988312

Digital Forensic Framework for a Cloud Environment

@inproceedings{Sibiya2012DigitalFF,
  title={Digital Forensic Framework for a Cloud Environment},
  author={George Sibiya and Hein S. Venter and Thomas Fogwill},
  year={2012}
}
The advent of cloud computing provides good opportunities for both good and malicious use. Cloud computing is at its infanc y stage and its security is still an open research issue. Malicious users take advantage of the current lack of advanced security mechanisms in the cloud. Cloud computing paradigm enables users to access computing resources without necessarily owni ng physical infrastructures. It is therefore easy for an attacker who intends to perfo rm malicious activities in the cloud to… Expand

Figures from this paper

Digital forensic readiness in a cloud environment
Although cloud computing is maturing, security issues are still prevalent. Most of the security issues that are in the cloud have existed since the advent of the Internet. These issues are escalatedExpand
Cloud Forensics: State-of-the-Art and Research Challenges
Cloud computing is a new operation model providing utility services over a shared virtualized resources. It is visualized that in future, Cloud can offer everything as a service (EAAS). Cloud ServiceExpand
DDOS Attacks Detection and Prevention with Cloud Trace Back
Department of Computer Science and Engineering, Jayoti Vidyapeeth Women’s University, Jaipur Cloud Computing makes computing real as a tool and in the form of services. Cloud Computing is simplyExpand
A forensically-enabled IaaS cloud computing architecture
TLDR
A forensic acquisition and analysis model that fundamentally shifts responsibility of the data back to the data owner rather than relying upon a third party is proposed, which aims to provide a richer and complete set of admissible evidence than what current CSPs are able to provide. Expand
An approach towards digital forensic framework for cloud
  • J. Shah, L. Malik
  • Computer Science
  • 2014 IEEE International Advance Computing Conference (IACC)
  • 2014
TLDR
The detail study of malicious activity that can be carried out in cloud is presented with the help of some case studies and detailed methodology of proposed architecture earlier mentioned in the paper. Expand
Cloud Computing Forensic Analysis: Trends and Challenges
TLDR
The chapter goes through the definition of the basic concepts, structures, and service models of the cloud computing paradigm, and describes the main advantages, disadvantages, challenges that face the digital forensic processes, and techniques that support the isolation and preservation of any digital evidences. Expand
Digital forensic investigation in cloud computing environment: Impact on privacy
  • Filipo Sharevski
  • Computer Science, Engineering
  • 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)
  • 2013
TLDR
The potential impact of the cloud forensics on privacy in the cloud computing environment is discussed, and several recommendations for adoption of privacy aware cloud forensic investigation process are offered. Expand
A forensic acquisition and analysis system for IaaS
TLDR
This model provides a different approach to a forensic acquisition and analysis system (FAAS) in an Infrastructure as a Service model, with no requirement for CSP involvement or modification to the CSP’s underlying architecture. Expand
A survey on cloud forensics challenges and solutions
TLDR
This article critically reviews cloud forensics' existing challenges and solutions, and it explores, based on a detailed review of the area, all the work that has been carried out both in digital and cloud forensic methodologies mainly for supporting the investigation of security incidents in cloud. Expand
Digital Forensics in Cloud Computing
  • Archit Kapur
  • International Journal of Computer Applications
  • 2021
For years, digital forensics has been used in computer crime investigations. It has changed and progressed in response to technological advances, and is currently entering a new phase as the conceptExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 28 REFERENCES
Technical Challenges of Forensic Investigations in Cloud Computing Environments
TLDR
This paper focuses on the technical aspects of digital forensics in distributed Cloud environments by assessing whether it is possible for the customer of Cloud Computing services to perform a traditional digital investigation from a technical standpoint. Expand
Cloud application logging for forensics
TLDR
A logging framework and guidelines that provide a proactive approach to logging to ensure that the data needed for forensic investigations has been generated and collected and helps IT architects and technical evaluators of logging architectures build a business oriented logging framework. Expand
Automated analysis for digital forensic science: semantic integrity checking
  • T. Stallard, K. Levitt
  • Computer Science
  • 19th Annual Computer Security Applications Conference, 2003. Proceedings.
  • 2003
TLDR
An expert system is presented with a decision tree that uses predetermined invariant relationships between redundant digital objects to detect semantic incongruities and automatically identifying relevant evidence so experts can focus on the relevant files, users, times and other facts first. Expand
Cloudbus Toolkit for Market-Oriented Cloud Computing
TLDR
The architecture for creating market-oriented Clouds and computing atmosphere by leveraging technologies such as virtual machines and thoughts on market-based resource management strategies that encompass both customer-driven service management and computational risk management to sustain SLA-oriented resource allocation are provided. Expand
Botnets: The Killer Web Applications
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover whatExpand
An introduction to digital forensics
TLDR
The definition of digital evidence is defined as “ information generated, stored or transmitted using electronic devices that may be relied upon in court” by the International Organization on Computer Evidence (IOCE) and the Scientific Working Group on Digital Evidence (SWGDE) for digital evidence. Expand
Cyber forensics i n the cloud, IANewsletter
  • Volume 14 Number
  • 2011
An i ntroduction to digital forensics
  • [Online] Availabl e at: http://acetweb.org/journal/ACETJournal_Vol6/ [Accessed
  • 2011
An introduction to digital forensics. [Online] Available at: http://acetweb.org/journal
  • An introduction to digital forensics. [Online] Available at: http://acetweb.org/journal
  • 2011
Challenges to digital forensics from cloud computing
  • [Online] Available at: http://www.china-forensic.com/downloads/2011 [Accessed
  • 2011
...
1
2
3
...