Analysis on digital forensics challenges and anti-forensics techniques in cloud computing

  • Authors

    • Divya Vadlamudi
    • Dr K. Thirupathi Rao
    • Pellakuri Vidyullatha
    • B ajasekharReddy
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.12230
  • Anti-Forensics, Cloud Computing, Cloud Forensic, Cloud Forensic Challenges and Cloud Forensic Solutions.
  • In the modern life, there is a rapid increase in the usage of the technology. One reason of increasing the technology is usage of cloud. The mobile devices or any other technological devices mainly depend on cloud. The cloud can be accessible from anywhere. Cloud forensic process had introduced to help the investigators to find the evidence when the criminal attacks the cloud and to maintain the integrity and security for the data stored in the cloud. The increasing in the criminal attacks in cloud, made the investigators to find the latest methods for the forensic investigation process. Similarly in the same way the criminals also discover new ways to hide the source of evidences. This causes damage to the investigation process and is called anti-forensics. To hide the sources anti-forensic techniques are used and research must be done against the anti-forensics techniques in cloud environment. In this paper we focused mainly on detailed study on various challenges in cloud forensic and anti-forensic techniques.

     

  • References

    1. [1] Malik, R., Shashidhar, N. and Chen, L., 2015, January. Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform. In Proceedings of the International Conference on Security and Management (SAM) (p. 3). The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).

      [2] Mell, P. and Grance, T., 2010. The NIST definition of cloud computing. Communications of the ACM, 53(6), p.50.

      [3] Kent, K., Chevalier, S., Grance, T. and Dang, H., 2006. Guide to integrating forensic techniques into incident response. NIST Special Publication, 10, pp.800-86.

      [4] Kessler, G.C., 2007, March. Anti-forensics and the digital investigator. In Australian Digital Forensics Conference (p. 1).

      [5] Dahbur, K. and Mohammad, B., 2011, April. The anti-forensics challenge. In Proceedings of the 2011 International Conference on Intelligent Semantic Web-Services and Applications (p. 14). ACM.

      [6] Kebande, V. and Venter, H.S., 2015, July. A functional architecture for cloud forensic readiness large-scale potential digital evidence analysis. In European Conference on Cyber Warfare and Security (p. 373). Academic Conferences International Limited.

      [7] Al Fahdi, M., Clarke, N.L. and Furnell, S.M., 2013, August. Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. In Information Security for South Africa, 2013 (pp. 1-8). IEEE.

      [8] Liu, F., Ren, L. and Bai, H., 2014. Mitigating Cross-VM Side Channel Attack on Multiple Tenants Cloud Platform. JCP, 9(4), pp.1005-1013.

      [9] Zawoad, S., Dutta, A.K. and Hasan, R., 2013, May. SecLaaS: secure logging-as-a-service for cloud forensics. In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security (pp. 219-230). ACM.

      [10] Zawoad, S. and Hasan, R., 2013. Cloud forensics: a meta-study of challenges, approaches, and open problems. arXiv preprint arXiv:1302.6312.

      [11] Damshenas, M., Dehghantanha, A., Mahmoud, R. and bin Shamsuddin, S., 2012, June. Forensics investigation challenges in cloud computing environments. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 190-194). IEEE.

      [12] Haeberlen, A., 2010. A case for the accountable cloud. ACM SIGOPS Operating Systems Review, 44(2), pp.52-57.

      [13] Ruan, K., 2012. Designing a forensic-enabling cloud ecosystem. Cybercrime and cloud forensics, pp.331-344.

      [14] Chen, G., Du, Y., Qin, P. and Du, J., 2012, September. Suggestions to digital forensics in Cloud computing ERA. In Network Infrastructure and Digital Content (IC-NIDC), 2012 3rd IEEE International Conference on (pp. 540-544). IEEE.

      [15] Juels, A. and Kaliski Jr, B.S., 2007, October. PORs: Proofs of retrievability for large files. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 584-597). Acm.

      [16] Dykstra, J. and Sherman, A.T., 2012. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation, 9, pp.S90-S98.

      [17] Grispos, G., Storer, T. and Glisson, W.B., 2013. Calm before the storm: the challenges of cloud. Emerging digital forensics applications for crime detection, prevention, and security, 4(1), pp.28-48.

      [18] Orton, I., Alva, A. and Endicott-Popovsky, B., 2012. Legal process and requirements for cloud forensic investigations. Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp.186-229.

      [19] Wolthusen, S.D., 2009, September. Overcast: Forensic discovery in cloud environments. In IT Security Incident Management and IT Forensics, 2009. IMF'09. Fifth International Conference on (pp. 3-9). IEEE.

      [20] Rani, D.R. and Kumari, G.G., 2016, April. A framework for detecting anti-forensics in cloud environment. In Computing, Communication and Automation (ICCCA), 2016 International Conference on (pp. 1277-1280). IEEE.

  • Downloads

  • How to Cite

    Vadlamudi, D., K. Thirupathi Rao, D., Vidyullatha, P., & ajasekharReddy, B. (2018). Analysis on digital forensics challenges and anti-forensics techniques in cloud computing. International Journal of Engineering & Technology, 7(2.7), 1072-1075. https://doi.org/10.14419/ijet.v7i2.7.12230