Analysis of Cloud Forensics Techniques for Emerging Technologies

Syed Ahmed Ali, Shahzad Memon, Farhan Sahito

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

Cloud computing is the technology of the modern era having invaluable features that convince enterprises to adopt. It provides opportunities to the enterprises to compete with their opponents, to facilitate their customers, and grow up their day to day business by reducing cost and infrastructure management burden. Regardless of the enormous features offered by cloud computing, enterprises generally hesitate to adopt it due to the physical inaccessibility and deployment of their intellectual properties to a location that is unknown to them. On the other hand, the cyber-criminals sniffing around to find the loopholes to breach in, and compromise the confidentiality, integrity, and availability of the resources managed by Cloud Service Provider (CSP). The emergence of the Internet of Things (IoT) and Cyber-Physical Cloud Systems (CPCS) where the data is processed and stored in the cloud environment, demands the need to tighten up the security of the cloud itself. Identifying and tracing the source of a cyber-attack plays an integral role in the investigation process. Digital forensics in the cloud termed Cloud Forensics which boosts the confidence of the stack holders by reconstructing the past cloud events to give a hypothetical view of the crime scene and describe how the malicious activity had happened? The collection of evidence especially in the cloud environment is the most complex task due to its scattered architecture. Moreover, the collected evidence was used for the investigation to shield the cloud environment from a future security breach and bring the cybercriminal to the court of justice. In this paper, we have presented an analysis of cloud forensics techniques and their practical challenges/limitations to cope with cloud forensic investigators.

Original languageEnglish
Title of host publicationProceedings - 2020 International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2020
EditorsMaaruf Ali, Mahdi H. Miraz, Andrew Ware, Safeeullah Soomro
PublisherInstitute of Electrical and Electronics Engineers
Pages106-111
Number of pages6
ISBN (Electronic)9781728184883
DOIs
Publication statusPublished - 9 Dec 2020
Event1st International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2020 - Virtual, Tirana, Albania
Duration: 9 Dec 202010 Dec 2020

Publication series

NameProceedings - 2020 International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2020

Conference

Conference1st International Conference on Computing, Networking, Telecommunications and Engineering Sciences Applications, CoNTESA 2020
Country/TerritoryAlbania
CityVirtual, Tirana
Period9/12/2010/12/20

Keywords

  • Cloud computing
  • Cyber-attack
  • Digital Forensics
  • Evidence collection
  • Investigation
  • Security logs

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems and Management
  • Biomedical Engineering
  • Process Chemistry and Technology
  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Analysis of Cloud Forensics Techniques for Emerging Technologies'. Together they form a unique fingerprint.

Cite this