scholarly journals Calm Before the Storm

2012 ◽  
Vol 4 (2) ◽  
pp. 28-48 ◽  
Author(s):  
George Grispos ◽  
Tim Storer ◽  
William Bradley Glisson

Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy, and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments, amongst other organizations. Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment, as well as discussing and identifying several new research challenges addressing this changing context.

Author(s):  
George Grispos ◽  
Tim Storer ◽  
William Bradley Glisson

Cloud computing is a rapidly evolving information technology (IT) phenomenon. Rather than procure, deploy, and manage a physical IT infrastructure to host their software applications, organizations are increasingly deploying their infrastructure into remote, virtualized environments, often hosted and managed by third parties. This development has significant implications for digital forensic investigators, equipment vendors, law enforcement, as well as corporate compliance and audit departments, amongst other organizations. Much of digital forensic practice assumes careful control and management of IT assets (particularly data storage) during the conduct of an investigation. This paper summarises the key aspects of cloud computing and analyses how established digital forensic procedures will be invalidated in this new environment, as well as discussing and identifying several new research challenges addressing this changing context.


2021 ◽  
Author(s):  
Dhanalakshmi P. ◽  
Rajarajeswari S ◽  
Nripendra Narayan Das ◽  
Karthikeyan C ◽  
L. Chandra Sekhar Reddy ◽  
...  

Abstract In the fast-developing technological world, a large number of informational data is obtained out of different software applications and hardware sources. Data storing, sharing of data, and then processing is more effective through the cloud computing method. In practice, the issue faced is a lack of security where the user details are leaked due to the exposure of software and hardware conflict. Among different data sharing technique, cloud computing is the most convenient method to be adapted due to service satisfying features and economy. Attribute-Based-Encryption (ABE) has the potential to detect even a narrow-drawn data sharing. The drawback of the conventional attribute-based encryption (ABE) poor data security and high over-head computation. The customer side satisfaction is not achieved because of security lacking in narrow-drawn informational data sharing as well as processing. The difficulty in achieving a standardized form of data sharing is an unsolved challenge for secured data processing. The attribute-based data sharing method is more effective for secured data processing in cloud computing. Customer satisfaction can be achieved through the secured services of cloud. The customer’s data should be secured and also the customer’s data is under an authorized access. The protection of data in cloud computing includes the usage of hardware solutions for a secured data operation, provides support in data storage, access, sharing, and automated detecting of risk during data processing.


2018 ◽  
Vol 3 (5) ◽  
pp. 1-6
Author(s):  
Musa Yusuf ◽  
Faki A. Silas ◽  
Salim Haruna

Cloud computing is where software applications, data storage and processing capacity are accessed via the internet. This paper involves with analysis of the importance of cloud computing in software application developed as a service. To achieved that, a web based application OPMaSwas developed to provide service that will improvetheaudit readiness and compliance, couple with conformance to records retention policies and automated record management bundled using SaaS model. The web application is meant to manage personnel of any given organization, providing strong functionalities developed in modules such as; personnel information management module, training information management module, leave management module, resume management module, appraisal management module, document management module, reporting module and payroll management module. This applies to a lot of third world countries especially in Nigeria where interest e-commerce is fast growing. The system was evaluated using software performance methods where a reasonable performance was achieved as compared to state of the art software.


Basically cloud computing security is essential nowadays, it has arisen as a technology to allow users as well as clients to access communications, data storage, software as well as exploitation Environment according to pay-as-what-use structure. Conventional digital forensic can’t be investigated due to some technical challenges like environmental as well as technical. The vibrant nature of cloud computing provides massive opportunities to identify malicious request using various security algorithms in cloud environment. Proposed research work identifies the current issues and provides solutions to reduce some challenges in the cloud environment. In this paper system proposed forensic investigation of cloud security for trusted and untrusted environments. System illustrated the various machine learning algorithms for eliminate the malicious request, and investigate the malicious user also. Proposed method generate the user log base snapshot during the active session and manual investigator can verify all logs and identify the malicious user. We offer a skilled technique for forensic examination in the cloud with the help of virtual machine (VM) and generate snapshots. The experimental analysis shows illustration of proposed security of system.


2018 ◽  
Vol 3 (2) ◽  
pp. 74
Author(s):  
Helina Apriyani ◽  
Sismadi Sismadi ◽  
Sefrika Sefrika

AbstrakInternet of things (IoT) adalah sebuah konsep yang menghubungkan komputer dan perangkat elektronik melalui internet dan dapat dikendalikan dari jarak jauh. Konsep terpenting dalam Internet of things (Iot) adalah modul sistem informasi, koneksi internet dan penyimpanan datanya dalam cloud computing. Konsep ini memiliki manfaat besar dalam perkembangan usaha dan kelangsungan bisnis perusahaan dimana hampir semua bidang menggunakan IoT untuk dapat bersaing di pasaran. Indonesia merupakan sebuah negara yang dianugerahi kekayaan alam yang melimpah ruah. Salah satu komoditi unggulan adalah produk pertanian. Penelitian ini bertujuan untuk membantu para petani dalam memasarkan produknya melalui e-commerce dengan menggunakan konsep Internet of things IoT. Metode penelitian dengan menggunakan metode incremental.  Incremental digunakan untuk mendesai produk, kemudian  diimplementasikan, dan diuji secara bertahap (setiap modul akan ditambahkan bertahap) hingga produk selesai. Hasil penelitian ini digunakan untuk membantu petani di Kabupaten Bogor untuk mendistribusikan penjualannya secara luas, meningkatkan revenue dan memutus rantai panjang proses penjualan. Kata kunci— sistem penjualan, incremental, Internet of Things (IoT), produk pertanian, Kabupaten Bogor Abstract Internet of things (IoT) is a concept that connects computers and electronic devices via the internet and can be controlled remotely. The main concept in Internet of things (IoT) is information systems, internet connections and data storage in cloud computing. This concept has great benefits in the efforts and efforts used to use IoT to be able to compete in the market. Indonesia is a country that is blessed with abundant natural resources. One of the leading commodities is agricultural products. This study aims to help farmers market their products through e-commerce using the IoT Internet of things concept. Research method using incremental method. Incremental to design the product, then implemented, and gradually delay (each module will be added gradually) until the product is finished. The results of this study are to help farmers in Bogor Regency to distribute sales widely, increase revenue and break the sales process. Keywords—sales system, incremental, Internet of Things (IoT), agricultural products, Kabupaten Bogor


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2017 ◽  
Vol 4 (2) ◽  
pp. 29
Author(s):  
SHINI Y.JOSLIN ◽  
PEARLSY ROSS J.CIBINO ◽  
◽  
Keyword(s):  

2018 ◽  
Vol 5 (2) ◽  
pp. 1 ◽  
Author(s):  
SHAFI'I MUHAMMAD ABDULHAMID ◽  
NAFISAT ABUBAKAR SADIQ ◽  
ABDULLAHI MOHAMMED ◽  
NADIM RANA ◽  
HARUNA CHIROMA ◽  
...  

Author(s):  
Prachi S. Deshpande ◽  
Subhash C. Sharma ◽  
Sateesh K. Peddoju
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document