2017
DOI: 10.1016/j.compeleceng.2017.02.006
|View full text |Cite
|
Sign up to set email alerts
|

Forensics framework for cloud computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
25
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 67 publications
(38 citation statements)
references
References 7 publications
0
25
0
1
Order By: Relevance
“…Edington Alex, R. Kishore et.al. [5], They highlighted some challenges which is faced by forensic investigator. In most of the research work investigators need to depend on CSP so there may be chance that CSP can alter data and this can affects complete investigation process.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Edington Alex, R. Kishore et.al. [5], They highlighted some challenges which is faced by forensic investigator. In most of the research work investigators need to depend on CSP so there may be chance that CSP can alter data and this can affects complete investigation process.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The massive amount of possible evidence that are generated by a large number of IoT devices, it will consequently bring new challenges in the aspect of collecting evidence from distributed IoT infrastructures. In addition, since a hacker can monopolize the evidence in IoT devices because the weakness of these devices in term of security, the extracting evidence from them maybe not acceptable in law court [9]. Moreover, because most of IoT data are stored in the Cloud, the Cloud becomes one of the main sources of evidence in IoT.…”
Section: Limitations In the Currently Available Forensic Toolsmentioning
confidence: 99%
“…Hence, investigators will face some of the problems of collecting evidence from the Cloud, because the procedures of digital forensic and tools assume to have physical access to the evidence source. However, in the Cloud, the investigators could find a difficulty to even to know where the data is located [9]. In addition, the physical servers could have many virtual machines that belong to different owners.…”
Section: Limitations In the Currently Available Forensic Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…This DE can be sought in different digital media such as Hard Drive, network traffic, and RAM [2]. Even though it is volatile, RAM embodies important information about perpetrators' activities [3][4][5]; one of which is the files that are currently open.…”
Section: Introductionmentioning
confidence: 99%