2021
DOI: 10.1007/s11831-021-09575-w
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Study of Cloud Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 56 publications
0
9
0
Order By: Relevance
“…Several researchers presented surveys on computer forensics [20], [21], [22], [23], cloud forensics [24], [25], [26], [27], and mobile forensics [28], [29], [30], [31], but this is the first survey that provides current state-of-the-art on computer forensics, techniques, and their comparison. The main contributions of this paper are as follows:…”
Section: A Research Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…Several researchers presented surveys on computer forensics [20], [21], [22], [23], cloud forensics [24], [25], [26], [27], and mobile forensics [28], [29], [30], [31], but this is the first survey that provides current state-of-the-art on computer forensics, techniques, and their comparison. The main contributions of this paper are as follows:…”
Section: A Research Contributionmentioning
confidence: 99%
“…The methods used for this objective are 'Catch it if you can' and 'Stop, look and listen,' which eventually covers the outline that includes identity threat, collecting evidence, examining data, analyzing and concluding data, presenting the analysis, and responding to attacks. [24], [94], [77] are some of the existing research surveys in the network forensics domain. Figure 3 defines the OSI model layers in detail.…”
Section: F Network Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature, we can find research works that have addressed challenges in cloud forensics and their solutions from different perspectives. Purnaye et al [19] explored the different dimensions of cloud fornesics and categorised the main challenges of this topic. Alex et al [20] discussed challenges in cloud forensics related to data acquisition, logging, dependence on cloud service providers, chain of custody, crime scene reconstruction, cross border law and law presentation.…”
Section: A Cloudmentioning
confidence: 99%
“…From this summary, we observe that there is a dearth of research work focusing on cloud forensic standard tools and technologies in the cloud environment. Also, very limited works have concentrated on pointing out the feasible Update forensic tools to fight novel cybercrime [19], [21], [22], [25], [26], [29] Lack of forensic readiness mechanisms and their management [20], [22], [25], [29], [31] Data management and its fragmentation hinders investigations [19]- [22], [24], [26]- [28], [31] Lack of trust and robust chain of custody preservation [19]- [22], [24], [25], [31] Lack of jurisdictional mechanisms for confidential data [24], [26], [31] Cross border investigations due to different jurisdictions and laws [19]- [22], [24] Lack of training and interoperability between investigators and court [21] Anti-forensics [19] B. NETWORKS Data monitoring and acquisition from network traffic are mandatory to prevent most of nowadays cyber-attacks [32]- [34], including, but not limited to, Distributed Denial of Service (DDoS), phishing, DNS tunnelling, Man-in-the-middle (MitM) attacks, SQL injection and others [35], [36].…”
Section: A Cloudmentioning
confidence: 99%