Abstract
Some positive edges of cloud computing such scalability, elasticity, accessing the cloud from anywhere, and device-independent nature of cloud, has opened many doors for many intruders to carry out their mischief acts with respect to the data stored in the clouds. It is sometimes very difficult to trace out the exact fact what has happened with data, due to region effect, due to legal issues, and due to technical issues are the main and huge hurdles that exist in the present scenario; also there lies a main drawback that the present direct cloud forensics methods are not too much effective to overcome the problem. One among the buzzing technologies in today’s techno world is cloud forensics, which has its own importance in many aspects due to exponential growth to data, to reduce maintenance cost, to provide security measures to the data, and these things make the individual persons to move and attract toward cloud concept, as cloud can go with these things easily where the client has to pay for the desired flavors of services which they want to utilize. As the huge and huge amount of data is being accumulated at a place due to which it sometimes compromise may be arose when cloud service provider do not take standard measures to overcome this.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Hu, et al.: Advantages and disadvantages of different cloud types (2011)
Broadhurst, R.: Developments in the global law enforcement of cyber crime. Policing Int. J. Police Strat. Manage. 29(2), 408–433 (2006)
Liles, S., Rogers, M., Hoebich, M.: A survey of the legal issues facing digital forensic experts. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V. Springer, Heidelberg, Germany, pp. 267–276 (2009)
Khaja Mohiddin, S., Yalavarthi, S.B., Kondragunta, V.: An analytical comparative approach of cloud forensic tools during cyber attacks in cloud. In: Bansal, J., Das, K., Nagar, A., Deep, K., Ojha, A. (eds.) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 817. Springer, Singapore (2019)
Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 18–21. IEEE Computer Society, Washington, DC, USA (2010)
Morsy, M.A., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia (2010)
Garfinkel, T., Rosenblum, M.: When virtual is harder than real: security challenges in virtual machine based computing environments. In: Proceedings of the 10th Conference on Hot Topics in Operating Systems, Santa Fe, NM, vol. 10, pp. 227–229. USENIX Association Berkeley, CA, USA (2005)
Wang, Z., Jiang, X.: HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 380–395. IEEE Computer Society, Washington, DC, USA (2010)
Winkler, V.: Securing the cloud: cloud computer security techniques and tactics. Elsevier Inc., Waltham, MA (2011)
Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a service security: challenges and solutions. In: The 7th International Conference on Informatics and Systems (INFOS), Potsdam, Germany, pp. 1–8. IEEE Computer Society, Washington, DC, USA (2010)
Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, pp. 199–212. ACM, New York, NY, USA (2009)
Townsend, M.: Managing a security program in a cloud computing environment. In: Information Security Curriculum Development Conference, Kennesaw, Georgia, pp. 128–133. ACM, New York, NY, USA (2009)
Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2011)
Ertaul, L., Singhal, S., Gökay, S.: Security challenges in cloud computing. In: Proceedings of the 2010 International conference on Security and Management SAM’10, pp. 36–42. CSREA Press, Las Vegas, USA (2010)
ENISA: Cloud Computing: benefits, risks and recommendations for information security (2009)
Jansen, W.A.: Cloud hooks: security and privacy issues in cloud computing. In: Proceedings of the 44th Hawaii international conference on system sciences, Koloa, Kauai, HI, pp. 1–10. IEEE Computer Society, Washington, DC, USA (2011)
Jasti, A., Shah, P., Nagaraj, R., Pendse, R.: Security in multi-tenancy cloud. In: IEEE International Carnahan Conference on Security Technology (ICCST), KS, USA, pp. 35–41. IEEE Computer Society, Washington, DC, USA (2010)
Cloud Security Alliance: Top threats to cloud computing V1.0. Available: https://cloudsecurityalliance.org/research/top-threats (2010)
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project (2010)
Hashizume, K., Rosado, D.G., Fernández-Medina, E., et al.: J. Internet Serv. Appl. 4, 5 (2013). https://doi.org/10.1186/1869-0238-4-5
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mohiddin, S.K., Babu, Y.S. (2020). Role of Cloud Forensics in Cloud Computing. In: Das, K., Bansal, J., Deep, K., Nagar, A., Pathipooranam, P., Naidu, R. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 1057. Springer, Singapore. https://doi.org/10.1007/978-981-15-0184-5_9
Download citation
DOI: https://doi.org/10.1007/978-981-15-0184-5_9
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0183-8
Online ISBN: 978-981-15-0184-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)