Abstract
In order to arm yourself and assess risk correctly in the cloud, carrying out investigations are necessary. Though Cloud Computing is the buzzing technology now a days, with the advent with which cloud computing is developing and providing solutions to the upcoming technologies where on the other side of it there also lies a down fall with respect to theft of data in the cloud, loss of data in the cloud which are related to forensic, these things create an distrustful relation between cloud user and cloud providers, during the past half decade cloud forensic has emerged as a challenging point that has to be solved in cloud computing, the prevailing existing solutions which were suggested at the initial stage of Cloud Forensics were satisfied at that time but those solutions cannot rule now also, due to which they are not up to the mark to give much satisfaction which there by strengthen the faith of users in cloud, and makes Cloud Service Providers to provide the services and make a path to be laid for the coming technologies to utilize the flavors of cloud computing. This paper inculcates the contents related to cloud forensic which are traced out which are being known, to be known. In this paper we have traced out the major causes of Cloud Forensics, and thrown a light on the causes and origins which are helpful for laying a success ladder for Cloud Forensic concepts, and provided relevant content which would be helpful to trace out the solutions which are causing obstacles in the field of Cloud Forensics, utilizing which one can get an overview of the challenges and if considered can definitely lead to a good solution methods which if implemented in a proper way can lead to recovery of lost data as well as to know the real cause of the effect and also in order to reduce their effect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ting, Y.H., et al.: Design and implementation of a cloud digital forensic laboratory (2013)
Zawoad, S., et al.: I have the proof: providing proofs of past data possession in cloud forensics. In: 2012 International Conference on Cyber Security, pp. 75–82. IEEE, December 2012
Yan, C.: Cybercrime forensic system in cloud computing. In: 2011 International Conference on Image Analysis and Signal Processing, pp. 612–615. IEEE, October 2011
Thorpe, S., Grandison, T., Campbell, A., Williams, J., Burrell, K., Ray, I.: Towards a forensic-based service oriented architecture framework for auditing of cloud logs. In: 2013 IEEE Ninth World Congress on Services, pp. 75–83. IEEE, June 2013
Lee, T., Lee, H., Rhee, K.-H., Shin, U.: The efficient implementation of distributed indexing with Hadoop for digital investigations on Big Data. Comput. Sci. Inf. Syst. 11(3), 1037–1054 (2014)
van Baar, R., van Beek, H., van Eijk, E.: Digital forensics as a service: a game changer. Digital Invest. 11, S54–S62 (2014)
Lee, J., Un, S.: Digital forensics as a service: a case study of forensic indexed search. In: 2012 International Conference on ICT Convergence (ICTC 2012), pp. 499–503. IEEE, October 2012
Zeng, G.: Research on digital forensics based on private cloud computing, vol. 2, no. 9, pp. 24–29 (2014)
Shende, J.R.G.: Cloud forensics (2014)
Wen, Y., Man, X., Le, K., Shi, W.: Forensics-as-a-Service (FaaS): computer forensic workflow management and processing using cloud, pp. 208–214 (2013)
Sang, T.: A log based approach to make digital forensics easier on cloud computing. In: 2013 Third International Conference on Intelligent System Design and Engineering Applications, pp. 91–94. IEEE, January 2013
Lee, J.Y., et al.: Remote forensics system based on network (2011)
Dykstra, J., Sherman, A.T.: Design and implementation of FROST: digital forensic tools for the Open Stack cloud computing platform. Digital Invest. 10, S87–S95 (2013)
Deepak, N., et al.: Digital forensics service platform for internet videos, vol. 2, pp. 456–464 (2013)
Li, J., Wang, Q., et al.: Performance overhead among three hypervisors: an experimental study using hadoop benchmarks. In: 2013 IEEE International Congress on Big Data, pp. 9–16, June 2013
Reddy, K., et al.: The architecture of a digital forensic readiness management system. Comput. Secur. 32, 73–89 (2013)
Shirkhedkar, D., et al.: Design of digital forensic technique for cloud computing, vol. 2, no. 6, pp. 192–194 (2014)
Reichert, Z., Richards, K., Yoshigoe, K.: Automated forensic data acquisition in the cloud. In: 2014 IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems, pp. 725–730. IEEE, October 2014
Belorkar, A., Geethakumari, G.: Regeneration of events using system snapshots for cloud forensic analysis. In: 2011 Annual IEEE India Conference, pp. 1–4. IEEE, December 2011
Shields, C., et al.: A system for the proactive, continuous, and efficient collection of digital forensic evidence. Digital Invest. 8, S3–S13 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mohiddin, S.K., Yalavarthi, S.B., Sharmila, S. (2017). A Complete Ontological Survey of Cloud Forensic in the Area of Cloud Computing. In: Deep, K., et al. Proceedings of Sixth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 547. Springer, Singapore. https://doi.org/10.1007/978-981-10-3325-4_5
Download citation
DOI: https://doi.org/10.1007/978-981-10-3325-4_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-3324-7
Online ISBN: 978-981-10-3325-4
eBook Packages: EngineeringEngineering (R0)