2016
DOI: 10.5120/ijca2016910521
|View full text |Cite
|
Sign up to set email alerts
|

Review on Cloud Forensics: An Open Discussion on Challenges and Capabilities

Abstract: Amongst all recently emerging research paradigms, Cloud Computing is very much significant due to its utility services provisioning with shared and virtualized resources. Cloud is going to provide Everything-as-a-Service (EaaS) in very near future because all the services (Infrastructure, Platform, Software) will be made available as and when required and that too with high flexibility and low cost. Consumers can avail all the services without investing for infrastructures. There lies the spark of it which att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 36 publications
0
1
0
Order By: Relevance
“…Hence, a good centralized security management and monitoring can be more effective for them because if they lack in security knowledge, they still believe in centralized and standardized cloud storage [46]. Furthermore, the mechanism of control can be attacked, breaking down isolation itself between users and allowing another user to access resources and data potentially when the network resources are being built on platforms, interfaces and systems that will share with others, another set of threat vectors are introduced in the meantime [47]. In addition, sometime the cloudshared architecture also puts a cloud service user at the risk from other cloud user if users themselves with their bad behaviour draw attention from either bad media publicity or law enforcement [48].…”
Section: Security Issuesmentioning
confidence: 99%
“…Hence, a good centralized security management and monitoring can be more effective for them because if they lack in security knowledge, they still believe in centralized and standardized cloud storage [46]. Furthermore, the mechanism of control can be attacked, breaking down isolation itself between users and allowing another user to access resources and data potentially when the network resources are being built on platforms, interfaces and systems that will share with others, another set of threat vectors are introduced in the meantime [47]. In addition, sometime the cloudshared architecture also puts a cloud service user at the risk from other cloud user if users themselves with their bad behaviour draw attention from either bad media publicity or law enforcement [48].…”
Section: Security Issuesmentioning
confidence: 99%