A Systematic Literature Review on Cloud Forensics in Cloud Environment

Authors

  • Vadetay Saraswathi Bai, T. Sudha

Keywords:

forensics, malpractices, algorithm, implications

Abstract

In the area of Cloud Environments, the use of cloud forensics has been developed as a result of the apparent resource, cost-effectiveness, ubiquitous nature, and flexibility of the cloud itself. This kind of cloud forensics includes private, hybrid and public models in addition to a variety of other choices such as security, database, software, and integration. The corporate organizations may realize major economic benefits from using this approach. Therefore, the traditional advanced encryption standard algorithm needs to be enhanced in order to scope with the emerging security threats in the cloud environment. This development comes with its own set of difficulties and malpractices in cloud. This article presents a comprehensive literature study addressing various existing tools and techniques in the field of cloud forensics according to AES algorithms. Further this study details about research challenges and scope of further research in automating the process of legal implications.

Downloads

Download data is not yet available.

Author Biography

Vadetay Saraswathi Bai, T. Sudha

Vadetay Saraswathi Bai1*, Prof T. Sudha2,

1Research Scholar, Dept.of CSE,

School of Engineering and Technology,Sri Padmavati Mahila Visvavidyalayam

Email id: saihumika9@gmail.com

2Dept. of Computer Science,

Sri Padmavati Mahila Visvavidyalayam,

Email id: thatimakula_sudha@yahoo.com

References

R. M. Blank, “Guide for conducting risk assessments,” Citeseer, 2011.

United Nations Conference on Trade and Development (UNCTAD), “Cybercrime Legislation Worldwide,” 2021.

Right Scale, “state-of-the-cloud-report,” 2019.

International Data Corporation (IDC), “Worldwide Public Cloud Services revenue,” 2021.

National Crime Records Bureau India (NCRB), “Crime in india 2020,” 2020.

Park, Jun-Hak, Sang-Ho Na, Jun-Young Park, Eui-Nam Huh, Chul-Woo Lee, and Hyoung-Chun Kim, “A Study on Cloud Forensics and Challenges in SaaS Application Environment,” in 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/Smart City/DSS), IEEE, 2016.

R. Montasari, “An Overview of Cloud Forensics Strategy: Capabilities, Challenges, and Opportunities,” in Strategic Engineering for Cloud Computing and Big Data Analytics, Cham, Springer International Publishing, 2017, pp. 189-205.

S. Ali, S. Memon and F. Sahito, “Challenges and Solutions in Cloud Forensics,” in Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing - ICCBDC'18, 2018.

A. Hosseinian, “Challenges of Cloud Forensics.” Enterprise Security: Second International Workshop,” in Revised Selected Papers, vol. 10131, Vancouver, BC: Springer, 2015.

N. Raza, “Challenges to network forensics in cloud computing,” in 2015 Conference on Information Assurance and Cyber Security (CIACS), 2015.

W. Mahmood, H. Jahankhani and A. Ozkaya, “Cloud Forensics Challenges Faced by Forensic Investigators,” in Communications in Computer and Information Science, Cham, Springer International Publishing, 2015, pp. 74-82.

D. Freet, R. Agrawal, S. John and J. Walker, “Cloud forensics challenges from a service model standpoint,” in Proceedings of the 7th International Conference on Management of computational and collective intElligence in Digital Eco Systems - MEDES '15, 2015.

Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S, “Cloud forensics: identifying the major issues and challenges,” in International conference on advanced information systems engineering, Springer, 2014.

Zargari, Shahrzad, and David Benford “Cloud forensics: Concepts, issues, and challenges,” in 2012 Third International Conference on Emerging Intelligent Data and Web Technologies, Bucharest, 2012.

Shah, J. J., and Latesh G. Malik, “Cloud forensics: issues and challenges,” in 2013 6th International Conference on Emerging Trends in Engineering and Technology, 2013.

A. Mishra, P. Matta, E. Pilli and R. Joshi, “Cloud Forensics: State-of-the-Art and Research Challenges,” in 2012 International Symposium on Cloud and Services Computing, IEEE, 2012.

Pichan, Ameer, Mihai Lazarescu, and Sie Teng Soh, “Towards a practical cloud forensics logging framework,” Journal of information security and applications, vol. 42, pp. 18--28, 2018.

X. Feng and Y. Zhao, “Digital Forensics Challenges to Big Data in the Cloud,” in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (Green Com) and IEEE Cyber, Physical and Social Computing (CPS Com) and IEEE Smart Data (Smart Data), IEEE, 2017.

L. Chen, L. Xu, X. Yuan and N. Shashidhar, “Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges,” in 2015 International Conference on Computing, Networking and Communications (ICNC), IEEE, 2015.

Poisel, Rainer, and Simon Tjoa, “Discussion on the challenges and opportunities of cloud forensics,” in International Conference on Availability, Reliability, and Security, 2012

Pichan, Ameer, Mihai Lazarescu, and Sie Teng Soh, “Cloud forensics: Technical challenges, solutions and comparative analysis,” Digital investigation, vol. 13, pp. 38--57, 2015.

S. Khan, “Cloud log forensics: Foundations, state of the art, and future directions,” ” ACM Computing Surveys (CSUR), vol. 49, p. 1–42, 2016.

D. Gonzales, J. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, “Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds,” IEEE Transactions on Cloud Computing, vol. 5, pp. 523-536, 2015.

C. Federici, “Alma Nebula: A Computer Forensics Framework for the Cloud,” Procedia Computer Science, vol. 19, pp. 139-146, 2013.

Zawoad, Shams, Amit Kumar Dutta, and Ragib Hasan., “forensics, Sec LaaS: secure logging-as-a-service for cloud,” in Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, 2013.

S. Zawoad, A. Dutta and R. Hasan, “Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service,” IEEE Transactions on Dependable and Secure Computing, vol. 13, pp. 148-162, 2015.

Povar, Digambar, and G. Geetha kumari, “A heuristic model for performing digital forensics in cloud computing environment,” in International Symposium on Security in Computing and Communication, 2014

M. Ahsan, M. Ahsan, A. Wahab, M. Idris, S. Khan, E. Bachura and K.-K. R. Choo, “CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics,” IEEE Transactions on Sustainable Computing, pp. 1-1, 2016

Kumar Raju, B. K. S. P., and G. Geetha kumari, “Event correlation in cloud: a forensic perspective,” Computing, vol. 98, no. 11, pp. 1203--1224, 2016.

S. Almulla, Y. Iraqi and A. Jones, “A Distributed Snapshot Framework for Digital Forensics Evidence Extraction and Event Reconstruction from Cloud Environment,” in 2013 IEEE 5th International Conference on Cloud Computing Technology and Science, vol. 1, IEEE, 2013.

S. S. Sampana, “Force (Forensic recovery of cloud evidence): A digital cloud forensics framework,” in 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), 2019

J. James and P. Gladyshev, “Challenges with automation in digital forensic investigations,” 2013.

E. Hemdan, D. El-Din and Manjaiah, in CFIM: Toward Building New Cloud Forensics Investigation Model.” Innovations in Electronics and Communication Engineering, Singapore, Springer, 2018, p. 545–554.

S. Zawoad and R. Hasan, “Chronos: Towards Securing System Time in the Cloud for Reliable Forensics Investigation,” in 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 1, IEEE, 2016.

Zhang, Wei-Zhe, Hu-Cheng Xie, and Ching-Hsien Hsu., “Automatic Memory Control of Multiple Virtual Machines on a Consolidated Server,” IEEE Transactions on Cloud Computing, vol. 5, pp. 2-14, 2015.

Roussev, Vassil, Irfan Ahmed, Andres Barreto, Shane McCulley, and Vivek Shanmughan, “Cloud forensics--Tool development studies & future outlook,” Digital investigation, vol. 18, pp. 79--95, 2016.

Rani, Deevi Radha, and G. Geetha Kumari, “A framework for detecting antiforensics in cloud environment,” in 2016 International Conference on Computing, Communication and Automation (ICCCA), 2016.

Alex, M. Edington and R. Kishore, “Forensics framework for cloud computing,” Computers & Electrical Engineering, vol. 60, p. 193–205, 2017

Ruan, Keyun, Joe Carthy, Tahar Kechadi, and Ibrahim Baggili, “Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results,” Digital Investigation, vol. 10, no. 1, pp. 34--43, 2013.

Uph off, Maximilian, Matthäus Wander, Torben Weis, and Marian Waltereit, “Secure Cloud: an encrypted, scalable storage for cloud forensics,” in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (Trust Com/Big Data SE), IEEE, 2018, pp. 1934--1941.

Rani, Deevi Radha, and G. Geetha Kumari, “A framework for detecting antiforensics in cloud environment,” in 2016 International Conference on Computing, Communication and Automation (ICCCA), 2016.

Raju, Bksp Kumar, and G. Geetha kumari, “A novel approach for incident response in cloud using forensics,” in Proceedings of the 7th ACM India Computing Conference, 2014.

GetData, Virtual Forensics Computing,

(https://www.virtualforensiccomputing.com/), [Accessed 30 June, 2015].

Wireshark, (https://www.wireshark.org/), [Acce ss ed 30 June, 2015].

Microsoft, Microsoft Expression Encoder4., (http://www.microsoft.com/en-us/ download/details.aspx?id=18974), [Accessed 30 June, 2015].

FTK. Forensics tool kit (FTK) computer forensics software, (http://accessdata.com/ solutions/digital-forensics/forensic-toolkit-ftk), [Accessed 30 June, 2015].

En Case,. Guidance Software.

(https://www.guidancesoftware.com/ products/Pages/encase-forensic/overview.aspx), [Accessed 30 June, 2015].

Dykstra, J., & Sherman, A, “Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform”, Digital Investigation, Vol.10, Page: 87-95, 2013.

Xen Acess Library. (http://code.google.com/ p/xenaccess/), [Accessed 30 June, 2015]

Bon Fire, Bon Fire. (http://www.bonfire-project .eu /services), [Accessed 30 June, 2015].

Eucalyptus, HP Helion Eucalyptus, (https:// www.eucalyptus.com/),[Accessed 30 June, 2015]

Cloud Sim, The Cloud Computing and Distributed Systems (CLOUDS) Laboratory, University of Melbourne,

(http://www.cloudbus.org/cloudsim/), [Accessed 30 June 2015].

OpenStack, (https://www.openstack.org/),

[Accessed 30 June, 2015]

Rack space, (http://www.rackspace.com/),

[Accessed 30 June, 2015]

Publication tendency of cloud forensics

Downloads

Published

28.02.2023

How to Cite

Vadetay Saraswathi Bai, T. Sudha. (2023). A Systematic Literature Review on Cloud Forensics in Cloud Environment. International Journal of Intelligent Systems and Applications in Engineering, 11(4s), 565–578. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2727

Issue

Section

Research Article