Proposed Proactive Digital Forensic Approach for Cloud Computing Environment

  • Authors

    • Ganthan Narayana Samy
    • Nurazean Maarop
    • Doris Hooi-Ten Wong
    • Fiza Abdul Rahim
    • Noor Hafizah Hassan
    • Sundresan Perumal
    • Pritheega Magalingam
    • Sameer Hasan Albakri
    https://doi.org/10.14419/ijet.v7i4.15.21362

    Received date: October 9, 2018

    Accepted date: October 9, 2018

    Published date: October 7, 2018

  • Cloud Computing Environment, Digital Forensic, Digital Forensics Approach, Digital Forensics Processes.
  • Abstract

    There are many challenges for the digital forensic process in the cloud computing due to the distinguished features of the cloud computing environment. Many of well-known digital forensic methods and tools are not suitable for cloud computing environment. The multi-tenancy, multi-stakeholder, Internet-based, dynamics expendability, and massive data, logs and datasets are examples of the cloud computing environment features that make conducting digital forensics in the cloud computing environment a very difficult task. Therefore, there is a need to develop an appropriate digital forensic approach for cloud computing environment. Thus, this paper proposed a proactive digital forensic approach for cloud computing environment.

  • References

    1. Alsubaih, A., Hafez, A., & Alghathbar, K. (2013). Authorization as a service in cloud environments. Proceedings of the IEEE Third Inter-national Conference on Cloud and Green Computing, pp. 487-493.
    2. British Standards Institution, ISO/IEC 27043:2016 Information tech-nology. Security techniques. Incident investigation principles and processes, 2016.
    3. Han, F. (2016). Cloud based forensics framework for social networks and a case study on reasoning links between nodes. International Journal of Future Generation Communication and Networking, 9(1), 23-34.
    4. McKemmish, R. (1999). What is forensic computing? Australian In-stitute of Criminology.
    5. Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to inte-grating forensic techniques into incident response. NIST Special Pub-lication, 10, 800-86.
    6. Martini, B., & Choo, K. K. R. (2012). An integrated conceptual digital forensic framework for cloud computing. Digital Investigation, 9(2), 71-80.
    7. Zawoad, S., Dutta, A. K., & Hasan, R. (2013). SecLaaS: secure log-ging-as-a-service for cloud forensics. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 219-230.
    8. Ahmad, S., Saad, N. L., Zulkifli, Z., & Nasaruddin, S. H. (2015). Proposed network forensic framework for analyzing IaaS cloud com-puting environment. Proceedings of the IEEE International Symposi-um on Mathematical Sciences and Computing Research, pp. 144-149.
    9. Ab Rahman, N. H., Glisson, W. B., Yang, Y., & Choo, K. K. R. (2016). Forensic-by-design framework for cyber-physical cloud sys-tems. IEEE Cloud Computing, 3(1), 50-59.
    10. Hirwani, M. (2012). Forensic acquisition and analysis of vmware vir-tual hard disks. Proceedings of the International Conference on Secu-rity and Management-World Congress in Computer Science, Comput-er Engineering and Applied Computing, pp. 1-7.
  • Downloads

  • How to Cite

    Narayana Samy, G., Maarop, N., Hooi-Ten Wong, D., Abdul Rahim, F., Hafizah Hassan, N., Perumal, S., Magalingam, P., & Hasan Albakri, S. (2018). Proposed Proactive Digital Forensic Approach for Cloud Computing Environment. International Journal of Engineering and Technology, 7(4.15), 12-15. https://doi.org/10.14419/ijet.v7i4.15.21362