Cyber Crime Investigation and Preventing in Reference for Cloud Forensics : A Review
DOI:
https://doi.org/10.32628/IJSRSET218327Keywords:
Crime, Cloud Forensics, Cloud Computing, Security, Digital Investigation, Crime PreventingAbstract
We are aware that cloud computing evolves as a transformative and No Doubt helpful field for futures generations on account of its several economic benefits in each domain as well as commercial, public, governmental, organizational, etc. Cloud forensics one of the most important areas within the developing field is that the means that investigators conduct researches in the relevant ways in which a digital crime took place over the cloud. This area is known as cloud forensics. Cloud forensics is a relevant field that works on all of this problem. This paper gives an overall research perspective of cloud forensics including its logging measures that need forensics challenges and what is the help of the cybercrime investigation and preventing for cloud forensics and the currently available solutions.
References
- Moussa, A. N., Ithnin, N., Almolhis, N., & Zainal, A. (2019, August). A Consumer-Oriented Cloud Forensic Process Model. In 2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC) (pp. 219-224). IEEE.
- NIST Cloud Computing forensics Science working Group Information Technology Laboratory
- Chen, G., Wu, D., Chen, G., Qin, P., Zhang, L., & Liu, Q. (2019, December). Research on Digital Forensics Framework for Malicious Behavior in Cloud. In 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (Vol. 1, pp. 1375-1379). IEEE.
- J. Stachowski, Implementing Digital Forensic Readiness: From Reactive to Proactive Process. 2016.
- Sampana, S. S. (2019, January). FoRCE (Forensic Recovery of Cloud Evidence): A Digital Cloud Forensics Framework. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) (pp. 212-212). IEEE.
- Zhang, Y., Wu, S., Jin, B., & Du, J. (2017, December). A blockchain-based process provenance for cloud forensics. In 2017 3rd IEEE International Conference on Computer and Communications (ICCC) (pp. 2470-2473). IEEE.
- NISTIR D. 8006 (2014) NIST Cloud Computing Forensic Science Challenges accessed at http://csrc. nist.gov/publications/drafts/nistir8006/draft_nistir_8006. pdf Gary Palmer (2001), "A Road Map for Digital Forensic Research”[R]. Technical Report DTR-T001-01, DFRWS, Report From the.
- Katilu, V. M., Franqueira, V. N., & Angelopoulou, O. (2015, August). Challenges of data provenance for cloud forensic investigations. In 2015 10th International Conference on Availability, Reliability, and Security (pp. 312-317). IEEE.
- R. K. L. Ko, P. Jagadpramana, and B. S. Lee, “Flogger: A Filecentric Logger for Monitoring File Access and Transfers within Cloud Computing Environments,” in In Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE Press, 2011, pp. 765–771.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.