scholarly journals Digital Forensic Investigation Challenges based on Cloud Computing Characteristics

2018 ◽  
Vol 7 (4.15) ◽  
pp. 7
Author(s):  
Ganthan Narayana Samy ◽  
Nurazean Maarop ◽  
Mohd Shahidan Abdullah ◽  
Sundresan Perum ◽  
Sameer Hasan Albakri ◽  
...  

One of the most popular computing technologies is cloud computing. There are many benefits in adopting cloud computing such as high-performance, flexibility and availability on-demand, more focused on the business objective and low-cost. However, the characteristics of the cloud computing environment have created many difficulties and challenges for digital forensic investigation processes. Therefore, this paper focuses on the digital forensic investigation challenges based on cloud computing characteristics.  

2011 ◽  
Vol 1 ◽  
pp. 76-80
Author(s):  
Cheng Yan

Cloud computing is Internet-based computing, whereby shared resources, software, and information to computers and other devices on demand. Besides the benefits, it provides a new environment and convenience for network crime, which results difficulties and challenges for forensic investigation. This paper reviews the conception of cloud computing and identifies some key issues of network crime. After analyzing the mechanism and architecture of cloud computing, we propose a forensic model to obtain and fix the criminal evidences. Through investigating from cloud and client aspects, we collect relative log files and communicated data packages, which can succeed to monitor network and store original crime behaviors.


Author(s):  
Suvendu Chandan Nayak ◽  
Sasmita Parida ◽  
Chitaranjan Tripathy ◽  
Prasant Kumar Pattnaik

The basic concept of cloud computing is based on “Pay per Use”. The user can use the remote resources on demand for computing on payment basis. The on-demand resources of the user are provided according to a Service Level Agreement (SLA). In real time, the tasks are associated with a time constraint for which they are called deadline based tasks. The huge number of deadline based task coming to a cloud datacenter should be scheduled. The scheduling of this task with an efficient algorithm provides better resource utilization without violating SLA. In this chapter, we discussed the backfilling algorithm and its different types. Moreover, the backfilling algorithm was proposed for scheduling tasks in parallel. Whenever the application environment is changed the performance of the backfilling algorithm is changed. The chapter aims implementation of different types of backfilling algorithms. Finally, the reader can be able to get some idea about the different backfilling scheduling algorithms that are used for scheduling deadline based task in cloud computing environment at the end.


2016 ◽  
pp. 221-247 ◽  
Author(s):  
Zhaolong Gou ◽  
Shingo Yamaguchi ◽  
B. B. Gupta

Cloud computing is a system, where the resources of a data center are shared using virtualization technology, such that it provides elastic, on demand and instant services to its customers and charges them based on the resources they use. In this chapter, we will discuss recent developments in cloud computing, various security issues and challenges associated with Cloud computing environment, various existing solutions provided for dealing with these security threats and will provide a comparative analysis these approaches. This will provide better understanding of the various security problems associated with the cloud, current solution space, and future research scope to deal with such attacks in better way.


2020 ◽  
Vol 34 (06) ◽  
pp. 2050085 ◽  
Author(s):  
Jaishree Jain ◽  
Ajit Singh

Cloud computing is a model that permits usage of a distributed resource for cloud users using the pay-as-you-use method. It offers many advantages to users and companies, in terms of various resources and applications as a service. In spite of the existence of these advantages, there are a few limitations that place constraints on the utilization of a cloud computing environment. Security is an important concern in a cloud computing environment as it probes various security attacks. Therefore, in this work, a novel quantum-based Rivest–Shamir–Adleman (RSA) model is proposed for encryption of forensic reports during storage or data sharing on clouds. To evaluate the effectiveness of the proposed approach, a suitable simulation environment is designed for a multi-cloud environment. Experimental results reveal the proposed approach can efficiently encrypt and store data on multiple clouds without introducing potential overheads. Therefore, the proposed approach is more efficient for real-time applications.


2014 ◽  
Vol 556-562 ◽  
pp. 6149-6153
Author(s):  
Min Gang Chen ◽  
Wen Bin Zhong ◽  
Wen Jie Chen ◽  
Yun Hu ◽  
Li Zhi Cai

With the increasingly fast-paced software releasing or updating, research on the method of an efficient software automation testing framework based on cloud computing has become particularly important. In this paper, we propose an automation testing framework over cloud. We also describe some key technologies in the aspect of the design of hierarchical test case and automatic distribution of test cases in the cloud computing environment. Testing experiments show that our framework can take advantage of on-demand testing resources in the cloud to improve the efficiency of automation testing.


2018 ◽  
Vol 7 (4.15) ◽  
pp. 12
Author(s):  
Ganthan Narayana Samy ◽  
Nurazean Maarop ◽  
Doris Hooi-Ten Wong ◽  
Fiza Abdul Rahim ◽  
Noor Hafizah Hassan ◽  
...  

There are many challenges for the digital forensic process in the cloud computing due to the distinguished features of the cloud computing environment. Many of well-known digital forensic methods and tools are not suitable for cloud computing environment. The multi-tenancy, multi-stakeholder, Internet-based, dynamics expendability, and massive data, logs and datasets are examples of the cloud computing environment features that make conducting digital forensics in the cloud computing environment a very difficult task. Therefore, there is a need to develop an appropriate digital forensic approach for cloud computing environment. Thus, this paper proposed a proactive digital forensic approach for cloud computing environment. 


2014 ◽  
Vol 4 (1) ◽  
pp. 33-44 ◽  
Author(s):  
Anil Singh ◽  
Kamlesh Dutta ◽  
Avtar Singh

Cloud Computing has changed the strategy of the way of providing different services to business and government agent as well as to sole users. Cloud Computing provides scalable and on demand services to users irrespective of their physical area. But this computing technology has many challenges. One of them is on demand resource allocation. In this paper a resource allocation method is proposed based on Analytical Hierarchy Process (AHP) called Multicriteria Preference Synthesis (MPS) method. MPS method combines many AHP synthesis methods (Additive Normalization, EigenVector, Multicriteria Synthesis etc.) to assign the priorities to the users' tasks. In MPS method Error Criteria is used to provide the consistency in providing the priorities to users' tasks if any violation is there.


Sign in / Sign up

Export Citation Format

Share Document