Skip to main content

Role of Cloud Forensics in Cloud Computing

  • Conference paper
  • First Online:
Soft Computing for Problem Solving

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1057))

Abstract

Some positive edges of cloud computing such scalability, elasticity, accessing the cloud from anywhere, and device-independent nature of cloud, has opened many doors for many intruders to carry out their mischief acts with respect to the data stored in the clouds. It is sometimes very difficult to trace out the exact fact what has happened with data, due to region effect, due to legal issues, and due to technical issues are the main and huge hurdles that exist in the present scenario; also there lies a main drawback that the present direct cloud forensics methods are not too much effective to overcome the problem. One among the buzzing technologies in today’s techno world is cloud forensics, which has its own importance in many aspects due to exponential growth to data, to reduce maintenance cost, to provide security measures to the data, and these things make the individual persons to move and attract toward cloud concept, as cloud can go with these things easily where the client has to pay for the desired flavors of services which they want to utilize. As the huge and huge amount of data is being accumulated at a place due to which it sometimes compromise may be arose when cloud service provider do not take standard measures to overcome this.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hu, et al.: Advantages and disadvantages of different cloud types (2011)

    Google Scholar 

  2. Broadhurst, R.: Developments in the global law enforcement of cyber crime. Policing Int. J. Police Strat. Manage. 29(2), 408–433 (2006)

    Article  Google Scholar 

  3. Liles, S., Rogers, M., Hoebich, M.: A survey of the legal issues facing digital forensic experts. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V. Springer, Heidelberg, Germany, pp. 267–276 (2009)

    Chapter  Google Scholar 

  4. Khaja Mohiddin, S., Yalavarthi, S.B., Kondragunta, V.: An analytical comparative approach of cloud forensic tools during cyber attacks in cloud. In: Bansal, J., Das, K., Nagar, A., Deep, K., Ojha, A. (eds.) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 817. Springer, Singapore (2019)

    Google Scholar 

  5. Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 18–21. IEEE Computer Society, Washington, DC, USA (2010)

    Google Scholar 

  6. Morsy, M.A., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia (2010)

    Google Scholar 

  7. Garfinkel, T., Rosenblum, M.: When virtual is harder than real: security challenges in virtual machine based computing environments. In: Proceedings of the 10th Conference on Hot Topics in Operating Systems, Santa Fe, NM, vol. 10, pp. 227–229. USENIX Association Berkeley, CA, USA (2005)

    Google Scholar 

  8. Wang, Z., Jiang, X.: HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 380–395. IEEE Computer Society, Washington, DC, USA (2010)

    Google Scholar 

  9. Winkler, V.: Securing the cloud: cloud computer security techniques and tactics. Elsevier Inc., Waltham, MA (2011)

    Google Scholar 

  10. Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a service security: challenges and solutions. In: The 7th International Conference on Informatics and Systems (INFOS), Potsdam, Germany, pp. 1–8. IEEE Computer Society, Washington, DC, USA (2010)

    Google Scholar 

  11. Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, pp. 199–212. ACM, New York, NY, USA (2009)

    Google Scholar 

  12. Townsend, M.: Managing a security program in a cloud computing environment. In: Information Security Curriculum Development Conference, Kennesaw, Georgia, pp. 128–133. ACM, New York, NY, USA (2009)

    Google Scholar 

  13. Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2011)

    Article  Google Scholar 

  14. Ertaul, L., Singhal, S., Gökay, S.: Security challenges in cloud computing. In: Proceedings of the 2010 International conference on Security and Management SAM’10, pp. 36–42. CSREA Press, Las Vegas, USA (2010)

    Google Scholar 

  15. ENISA: Cloud Computing: benefits, risks and recommendations for information security (2009)

    Google Scholar 

  16. Jansen, W.A.: Cloud hooks: security and privacy issues in cloud computing. In: Proceedings of the 44th Hawaii international conference on system sciences, Koloa, Kauai, HI, pp. 1–10. IEEE Computer Society, Washington, DC, USA (2011)

    Google Scholar 

  17. Jasti, A., Shah, P., Nagaraj, R., Pendse, R.: Security in multi-tenancy cloud. In: IEEE International Carnahan Conference on Security Technology (ICCST), KS, USA, pp. 35–41. IEEE Computer Society, Washington, DC, USA (2010)

    Google Scholar 

  18. Cloud Security Alliance: Top threats to cloud computing V1.0. Available: https://cloudsecurityalliance.org/research/top-threats (2010)

  19. https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project (2010)

  20. Hashizume, K., Rosado, D.G., Fernández-Medina, E., et al.: J. Internet Serv. Appl. 4, 5 (2013). https://doi.org/10.1186/1869-0238-4-5

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shaik Khaja Mohiddin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mohiddin, S.K., Babu, Y.S. (2020). Role of Cloud Forensics in Cloud Computing. In: Das, K., Bansal, J., Deep, K., Nagar, A., Pathipooranam, P., Naidu, R. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 1057. Springer, Singapore. https://doi.org/10.1007/978-981-15-0184-5_9

Download citation

Publish with us

Policies and ethics