z-logo
open-access-imgOpen Access
Cloud Forensics-A Framework for Investigating Cyber Attacks in Cloud Environment
Author(s) -
Sheik Khadar Ahmad Manoj,
D. Lalitha Bhaskari
Publication year - 2016
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2016.05.202
Subject(s) - cloud computing , computer security , computer science , cloud computing security , service provider , trustworthiness , internet privacy , service (business) , business , marketing , operating system
With the rapid growth of cloud adoption in both private and public sectors globally, cloud computing environment has become one of the prospective battle field for cyber attackers where one of the major challenges of cloud computing is the protection of data from various attacks. Mostly, Cloud services are provided by the service providers where data security is a major concern for the client. In this paper an attempt to provide a possible solution for such threats is proposed along with an exposure to various issues related to data security in cloud and the various challenges faced by forensic experts in cloud. A model based on trusted third party (TTP) along with a cloud forensics investigation team (CFIT) proves to be a better solution to enhance the trustworthiness of the service provider and thereby facilitate the cloud providers to trap cyber attackers with strong collection of evidences which might help in further legal process

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom