Proposed Proactive Digital Forensic Approach for Cloud Computing Environment
-
https://doi.org/10.14419/ijet.v7i4.15.21362
Received date: October 9, 2018
Accepted date: October 9, 2018
Published date: October 7, 2018
-
Cloud Computing Environment, Digital Forensic, Digital Forensics Approach, Digital Forensics Processes. -
Abstract
There are many challenges for the digital forensic process in the cloud computing due to the distinguished features of the cloud computing environment. Many of well-known digital forensic methods and tools are not suitable for cloud computing environment. The multi-tenancy, multi-stakeholder, Internet-based, dynamics expendability, and massive data, logs and datasets are examples of the cloud computing environment features that make conducting digital forensics in the cloud computing environment a very difficult task. Therefore, there is a need to develop an appropriate digital forensic approach for cloud computing environment. Thus, this paper proposed a proactive digital forensic approach for cloud computing environment.
-
References
- Alsubaih, A., Hafez, A., & Alghathbar, K. (2013). Authorization as a service in cloud environments. Proceedings of the IEEE Third Inter-national Conference on Cloud and Green Computing, pp. 487-493.
- British Standards Institution, ISO/IEC 27043:2016 Information tech-nology. Security techniques. Incident investigation principles and processes, 2016.
- Han, F. (2016). Cloud based forensics framework for social networks and a case study on reasoning links between nodes. International Journal of Future Generation Communication and Networking, 9(1), 23-34.
- McKemmish, R. (1999). What is forensic computing? Australian In-stitute of Criminology.
- Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to inte-grating forensic techniques into incident response. NIST Special Pub-lication, 10, 800-86.
- Martini, B., & Choo, K. K. R. (2012). An integrated conceptual digital forensic framework for cloud computing. Digital Investigation, 9(2), 71-80.
- Zawoad, S., Dutta, A. K., & Hasan, R. (2013). SecLaaS: secure log-ging-as-a-service for cloud forensics. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 219-230.
- Ahmad, S., Saad, N. L., Zulkifli, Z., & Nasaruddin, S. H. (2015). Proposed network forensic framework for analyzing IaaS cloud com-puting environment. Proceedings of the IEEE International Symposi-um on Mathematical Sciences and Computing Research, pp. 144-149.
- Ab Rahman, N. H., Glisson, W. B., Yang, Y., & Choo, K. K. R. (2016). Forensic-by-design framework for cyber-physical cloud sys-tems. IEEE Cloud Computing, 3(1), 50-59.
- Hirwani, M. (2012). Forensic acquisition and analysis of vmware vir-tual hard disks. Proceedings of the International Conference on Secu-rity and Management-World Congress in Computer Science, Comput-er Engineering and Applied Computing, pp. 1-7.
-
Downloads
-
How to Cite
Narayana Samy, G., Maarop, N., Hooi-Ten Wong, D., Abdul Rahim, F., Hafizah Hassan, N., Perumal, S., Magalingam, P., & Hasan Albakri, S. (2018). Proposed Proactive Digital Forensic Approach for Cloud Computing Environment. International Journal of Engineering and Technology, 7(4.15), 12-15. https://doi.org/10.14419/ijet.v7i4.15.21362
