Cloud Computing for Analysis on Digital Forensics Challenges
AUTHORS
Divya Vadlamudi,Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur, Andhra Pradesh, India
ABSTRACT
In the trendy life, there's a speedy increase within the usage of the technology. One reason of increasing the technology is usage of cloud. The mobile devices or any other technological devices mainly depend on cloud. The cloud can be accessible from anywhere. Cloud rhetorical method had introduced to assist the investigators to search out the proof once the criminal attacks the cloud and to take care of the integrity and security for the information keep within the cloud. The increasing within the criminal attacks in cloud, created the investigators to search out the most recent ways for the rhetorical investigation method. equally within the same means the criminals additionally discover new ways that to cover the supply of evidences. This causes harm to the investigation method and is named anti-forensics. to cover the sources anti-forensic techniques area unit used and analysis should be done against the anti-forensics techniques in cloud surroundings. during this paper we have a tendency to targeted chiefly on careful study on numerous challenges in cloud rhetorical and anti-forensic techniques.
KEYWORDS
Anti-forensics; Cloud computing; Cloud forensic; Cloud forensic challenges and Cloud forensic solutions
REFERENCES
[1] Mell, P. and Grance, T., (2010). The NIST definition of cloud computing. Communications of the ACM, 53(6), p.50.
[2] Kent, K., Chevalier, S., Grance, T. and Dang, H., (2006). “Guide to integrating forensic techniques into incident response”. NIST Special Publication, 10, pp.800-86.
[3] Kessler, G.C., (2007), March. “Anti-forensics and the digital investigator”. In Australian Digital Forensics Conference (p. 1). DOI: 10.4225/75/57ad39ee7ff25(CrossRef)(Google Scholar)
[4] Dahbur, K. and Mohammad, B., (2011), April. “The anti-forensics challenge”. In Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications (pp. 14). ACM. DOI: 10.1145/1980822.1980836(CrossRef)(Google Scholar)
[5] Kebande, V. and Venter, H.S., (2015), July. “A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis”. In European Conference on Cyber Warfare and Security (pp. 373). Academic Conferences International Limited.
[6] Haeberlen, A., (2010). “A case for the accountable cloud”. ACM SIGOPS Operating Systems Review, 44(2), pp.52-57.DOI: 10.1145/1773912.1773926(CrossRef)(Google Scholar)
[7] Ruan, K., “Designing a forensic-enabling cloud ecosystem”. Cybercrime and cloud forensics, pp.331-344. (2012). DOI: 10.4018/978-1-4666-6539-2.ch026(CrossRef)(Google Scholar)
[8] Chen, G., Du, Y., Qin, P. and Du, J., September. “Suggestions to digital forensics in Cloud computing ERA”. In Network Infrastructure and Digital Content (IC-NIDC), 2012 3rd IEEE International Conference on (pp. 540-544). IEEE. (2012) DOI: 10.1109/ICNIDC.2012.6418812(CrossRef)(Google Scholar)
[9] Juels, A. and Kaliski Jr, B.S.,. “PORs: Proofs of irretrievability for large files”. In Proceedings of the 14th ACM conference on Computer and communications security (pp.584-597). (2007) Acm. DOI: 10.1145/1315245.1315317(CrossRef)(Google Scholar)
[10] Rani, D.R. and Kumari, G.G., (2016), April. “A framework for detecting anti-forensics in cloud environment”. In Computing, Communication and Automation (ICCCA), 2016 International Conference on (pp. 1277-1280). IEEE.DOI: 10.1109/CCAA.2016.7813913(CrossRef)(Google Scholar)