scholarly journals Cyber Crime Investigation and Preventing in Reference for Cloud Forensics : A Review

Author(s):  
Kinjal Bhagariya ◽  
Dr. Ravi Sheth ◽  
Ms. Dharati Dholariya

We are aware that cloud computing evolves as a transformative and No Doubt helpful field for futures generations on account of its several economic benefits in each domain as well as commercial, public, governmental, organizational, etc. Cloud forensics one of the most important areas within the developing field is that the means that investigators conduct researches in the relevant ways in which a digital crime took place over the cloud. This area is known as cloud forensics. Cloud forensics is a relevant field that works on all of this problem. This paper gives an overall research perspective of cloud forensics including its logging measures that need forensics challenges and what is the help of the cybercrime investigation and preventing for cloud forensics and the currently available solutions.

Author(s):  
Vaithianathan Geetha

Cloud computing is gaining wide popularity due to low infrastructure cost and high resource utilization. Cloud can be private or public. Users can store their data and avail cloud sessions on pay-per-use basis. This multi-tenancy support can lead to several problems. Cloud forensics is a cross discipline of cloud computing and digital forensics. It ensures to find out the culprit when there is a security breach. Several techniques are proposed to secure user data and provide legally acceptable evidences in case of cyber crime. This chapter aims at discussing the issues and challenges of cloud forensics and the currently available solutions. Logs are widely accepted as legal evidence of how fraud was perpetrated. Creation and maintenance of logs also poses a number of challenges. This chapter also aims at exploring these challenges and solutions for managing logs.


2015 ◽  
Vol 4 (1) ◽  
pp. 135-142 ◽  
Author(s):  
Nimisha Singh ◽  
Abha Rishi

As the world becomes increasingly interlinked through the Internet, cyberspace frauds are also on the rise. This is a case study on a company, Pyramid Cyber Security (P) Ltd., which specializes in digital crime, fraud and forensic solutions and services in India. Over the years, the company has established several digital forensics laboratories and security projects for agencies in law enforcement, the public sector and corporate organizations. With the scalability, flexibility and economic advantage offered by cloud computing, more and more organizations are moving towards cloud for their applications. With all the benefits of cloud computing, it also opens up a company to the danger of digital crime and security breaches on the cloud platform. This has thrown open new vistas for Pyramid, putting it in a dilemma of whether to focus on the existing business or explore new opportunities in cloud forensics investigation thrown by the wide acceptance of cloud computing. It also poses the question whether a company should go in for pre-incident or post-incident digital network security architecture. It is a teaching case.


2021 ◽  
Vol 6 (1) ◽  
Author(s):  
Fayyad Kazan H

In the context of forensic investigations, the traditional understanding of evidence is changing nowadays where most prosecutors, lawyers and judges heavily rely on multimedia substantiations. However, the evolution of easy-to-use media manipulating tools, made it very easy for almost any (technical) person to alter the content of a digital media (e.g. digital image, audio or video) without leaving any traces that can be detectable by human's basic perceptions. Therefore, the validity of the digital media can no longer be guaranteed which in turn leads to a serious problem regarding digital crime investigation. As there are tools which can tamper media, there are also ones that can do the reverse: detect the tampering. This paper sheds the light on the available anti-forensics tools. Experiments were done using some of these tools to detect tampered media – more specifically video tampering. Our experiments showed the efficiency of these tools by differentiating between original and altered evidences.


2021 ◽  
Vol 2 (1) ◽  
pp. 27-34

Cyber Crime is the dark side of digital technology. Cyber Stalking is one of the cybercrimes against Individual which has been continuously growing in Digital era. The Cases of cyberstalking or bullying of women or children increased by 36% from 542 in 2017 to 739 in 2018, data released recently by the NCRB showed. Meanwhile, the conviction rate for cyberstalking or bullying of women and children fell 15% points, to 25% in 2018 from 40% in 2017.2Despite Information Technology Act 2000 and other legislations Cyberstalking crime is on the rise in India. Despite these prevailing situations, the Indian judiciary is still a ray of hope. To curbing this digital crime we need to throw light on present Cyber Stalking crime’s situations and do amendments in current prevailing cyber legislations in India. Through this paper, the researcher will try to study Cyber Stalking against women in India. This paper is an attempt to analyze the Indian legislation, Cyber Legislation for Cyber Stalking, and the Judiciary's approach relating to the rights of women in cyberspace upholding Gender Justice.


Author(s):  
Inderbir Kaur

Cloud computing is an upcoming IT approach that presents various new economic benefits, effective rapid deployment of services to achieve ultimate benefits and goals. Cloud computing reveals an effective connection of internet and computing technologies with personal or business computing that is changing the environment of computing process by providing solutions which are designed, delivered and managed. This model is a remarkable shift from the traditional model of computing. The cloud is an attractive technology solution as it enables to reduce the total cost of ownership and giving “green computing” environment by energy saving concept. Use of Cloud computing technology in different areas provides greater opportunities in the overall development of world, especially India. This chapter throw lights on various dimensions in which cloud computing concept is used . This paper also reviews the potential and opportunities for cloud computing in the healthcare industry, tourism, defence and military applications and various another aspects.


Author(s):  
Mohammed S. Gadelrab ◽  
Ali A. Ghorbani

New computing and networking technologies have not only changed the way traditional crimes are committed but also introduced completely brand new “cyber” crimes. Cyber crime investigation and forensics is relatively a new field that can benefit from methods and tools from its predecessor, the traditional counterpart. This chapter explains the problem of cyber criminal profiling and why it differs from ordinary criminal profiling. It tries to provide an overview of the problem and the current approaches combined with a suggested solution. It also discusses some serious challenges that should be addressed to be able to produce reliable results and it finally presents some ideas for the future work.


Author(s):  
Inderbir Kaur

Cloud computing is an upcoming IT approach that presents various new economic benefits, effective rapid deployment of services to achieve ultimate benefits and goals. Cloud computing reveals an effective connection of internet and computing technologies with personal or business computing that is changing the environment of computing process by providing solutions which are designed, delivered and managed. This model is a remarkable shift from the traditional model of computing. The cloud is an attractive technology solution as it enables to reduce the total cost of ownership and giving “green computing” environment by energy saving concept. Use of Cloud computing technology in different areas provides greater opportunities in the overall development of world, especially India. This chapter throw lights on various dimensions in which cloud computing concept is used . This paper also reviews the potential and opportunities for cloud computing in the healthcare industry, tourism, defence and military applications and various another aspects.


Sign in / Sign up

Export Citation Format

Share Document