2021
DOI: 10.1007/978-981-16-4177-0_7
|View full text |Cite
|
Sign up to set email alerts
|

Digital Forensic Tools for Cloud Computing Environment

Abstract: In general, digital forensics process can be stated as a process of identifying, analyzing and presenting the digital evidence. It comprises activities like identification, preservation, examination, analysis. Complication and complexity in the execution of these activities increase with the size of data. Cloud computing technology exacerbate the situation. Various forensic tools have been developed to improve the performance and efficiency of forensic activities. This paper highlights such digital forensic to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…For example, some events logging into the cloud with an account need to be followed with an action using the same credentials. In the case of data encryption, DFI can use Forensics Tool Kit (FTK) [33] to decrypt an encrypted piece of evidence. The investigator also needs to associate every piece of evidence with its legality procedures under SLA, local authority contract, or international law.…”
Section: Evaluation Phasementioning
confidence: 99%
“…For example, some events logging into the cloud with an account need to be followed with an action using the same credentials. In the case of data encryption, DFI can use Forensics Tool Kit (FTK) [33] to decrypt an encrypted piece of evidence. The investigator also needs to associate every piece of evidence with its legality procedures under SLA, local authority contract, or international law.…”
Section: Evaluation Phasementioning
confidence: 99%
“…With the current cyber-crime scenarios in which physical and digital boundaries have essentially been diluted, resulting in a tremendous increase in cyber-attacks in recent years, the complexity, heterogeneous environments, and influential nature of IoT and cloud computing are driving the adoption of innovative and upcoming frameworks and models to deter and deal with. [9] B. Digital Evidence Principles For any digital evidence to be admissible in court of law, there are certain mandatory attributes that the evidence must have.…”
Section: Context and Backgroundmentioning
confidence: 99%
“…This includes the difficulties of data access, data originating from various locations, the traceability and transparency of evidence, and huge-volume data analysis. During the past few years, a large number of researchers have focused on forensic analysis based on cloud computing [ 13 , 14 , 15 ], evidence modeling [ 16 , 17 , 18 ], and assisting the community of law enforcement. Blockchain technology is a distributed ledger system that collects and saves the proper records in the decentralized format of a peer-to-peer network.…”
Section: Introductionmentioning
confidence: 99%