Analysis of Cloud Forensics Techniques for Emerging Technologies

Syed Ahmed Ali, Shahzad Memon, Farhan Sahito

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Cloud computing is the technology of the modern era having invaluable features that convince enterprises to adopt. It provides opportunities to the enterprises to compete with their opponents, to facilitate their customers, and grow up their day to day business by reducing cost and infrastructure management burden. Regardless of the enormous features offered by cloud computing, enterprises generally hesitate to adopt it due to the physical inaccessibility and deployment of their intellectual properties to a location that is unknown to them. On the other hand, the cyber-criminals sniffing around to find the loopholes to breach in, and compromise the confidentiality, integrity, and availability of the resources managed by Cloud Service Provider (CSP). The emergence of the Internet of Things (IoT) and Cyber-Physical Cloud Systems (CPCS) where the data is processed and stored in the cloud environment, demands the need to tighten up the security of the cloud itself. Identifying and tracing the source of a cyber-attack plays an integral role in the investigation process. Digital forensics in the cloud termed Cloud Forensics which boosts the confidence of the stack holders by reconstructing the past cloud events to give a hypothetical view of the crime scene and describe how the malicious activity had happened? The collection of evidence especially in the cloud environment is the most complex task due to its scattered architecture. Moreover, the collected evidence was used for the investigation to shield the cloud environment from a future security breach and bring the cybercriminal to the court of justice. In this paper, we have presented an analysis of cloud forensics techniques and their practical challenges/limitations to cope with cloud forensic investigators.

Originalspracheenglisch
TitelProceedings - 2020 International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2020
Redakteure/-innenMaaruf Ali, Mahdi H. Miraz, Andrew Ware, Safeeullah Soomro
Herausgeber (Verlag)Institute of Electrical and Electronics Engineers
Seiten106-111
Seitenumfang6
ISBN (elektronisch)9781728184883
DOIs
PublikationsstatusVeröffentlicht - 9 Dez. 2020
Veranstaltung1st International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2020 - Virtual, Tirana, Albanien
Dauer: 9 Dez. 202010 Dez. 2020

Publikationsreihe

NameProceedings - 2020 International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2020

Konferenz

Konferenz1st International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2020
Land/GebietAlbanien
OrtVirtual, Tirana
Zeitraum9/12/2010/12/20

ASJC Scopus subject areas

  • Computernetzwerke und -kommunikation
  • Angewandte Informatik
  • Informationssysteme und -management
  • Biomedizintechnik
  • Prozesschemie und -technologie
  • Artificial intelligence

Fingerprint

Untersuchen Sie die Forschungsthemen von „Analysis of Cloud Forensics Techniques for Emerging Technologies“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren