Cyber Crime Investigation and Preventing in Reference for Cloud Forensics : A Review

Authors

  • Kinjal Bhagariya  School of Information Technology, Artificial Intelligence and Cyber Security Rashtriya Raksha University, Gandhinagar, Gujarat, India
  • Dr. Ravi Sheth  School of Information Technology, Artificial Intelligence and Cyber Security Rashtriya Raksha University, Gandhinagar, Gujarat, India
  • Ms. Dharati Dholariya  School of Information Technology, Artificial Intelligence and Cyber Security Rashtriya Raksha University, Gandhinagar, Gujarat, India

DOI:

https://doi.org//10.32628/IJSRSET218327

Keywords:

Crime, Cloud Forensics, Cloud Computing, Security, Digital Investigation, Crime Preventing

Abstract

We are aware that cloud computing evolves as a transformative and No Doubt helpful field for futures generations on account of its several economic benefits in each domain as well as commercial, public, governmental, organizational, etc. Cloud forensics one of the most important areas within the developing field is that the means that investigators conduct researches in the relevant ways in which a digital crime took place over the cloud. This area is known as cloud forensics. Cloud forensics is a relevant field that works on all of this problem. This paper gives an overall research perspective of cloud forensics including its logging measures that need forensics challenges and what is the help of the cybercrime investigation and preventing for cloud forensics and the currently available solutions.

References

  1. Moussa, A. N., Ithnin, N., Almolhis, N., & Zainal, A. (2019, August). A Consumer-Oriented Cloud Forensic Process Model. In 2019 IEEE 10th Control and System Graduate Research Colloquium (ICSGRC) (pp. 219-224). IEEE.
  2. NIST Cloud Computing forensics Science working Group Information Technology Laboratory
  3. Chen, G., Wu, D., Chen, G., Qin, P., Zhang, L., & Liu, Q. (2019, December). Research on Digital Forensics Framework for Malicious Behavior in Cloud. In 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (Vol. 1, pp. 1375-1379). IEEE.
  4. J. Stachowski, Implementing Digital Forensic Readiness: From Reactive to Proactive Process. 2016.
  5. Sampana, S. S. (2019, January). FoRCE (Forensic Recovery of Cloud Evidence): A Digital Cloud Forensics Framework. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) (pp. 212-212). IEEE.
  6. Zhang, Y., Wu, S., Jin, B., & Du, J. (2017, December). A blockchain-based process provenance for cloud forensics. In 2017 3rd IEEE International Conference on Computer and Communications (ICCC) (pp. 2470-2473). IEEE.
  7. NISTIR D. 8006 (2014) NIST Cloud Computing Forensic Science Challenges accessed at http://csrc. nist.gov/publications/drafts/nistir8006/draft_nistir_8006. pdf Gary Palmer (2001), "A Road Map for Digital Forensic Research”[R]. Technical Report DTR-T001-01, DFRWS, Report From the.
  8. Katilu, V. M., Franqueira, V. N., & Angelopoulou, O. (2015, August). Challenges of data provenance for cloud forensic investigations. In 2015 10th International Conference on Availability, Reliability, and Security (pp. 312-317). IEEE.
  9.  R. K. L. Ko, P. Jagadpramana, and B. S. Lee, “Flogger: A Filecentric Logger for Monitoring File Access and Transfers within Cloud Computing Environments,” in In Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE Press, 2011, pp. 765–771.

Downloads

Published

2021-06-30

Issue

Section

Research Articles

How to Cite

[1]
Kinjal Bhagariya, Dr. Ravi Sheth, Ms. Dharati Dholariya, " Cyber Crime Investigation and Preventing in Reference for Cloud Forensics : A Review , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 3, pp.205-210, May-June-2021. Available at doi : https://doi.org/10.32628/IJSRSET218327