학술논문

Role of Cloud Forensics in Cloud Computing
Document Type
Chapter
Author
Das, Kedar Nath, Editor; Bansal, Jagdish Chand, Editor; Deep, Kusum, Editor; Nagar, Atulya K., Editor; Pathipooranam, Ponnambalam, Editor; Naidu, Rani Chinnappa, Editor; Mohiddin, Shaik KhajaBabu, Yalavarthi SureshKacprzyk, Janusz, Series Editor; Pal, Nikhil R., Advisory Editor; Bello Perez, Rafael, Advisory Editor; Corchado, Emilio S., Advisory Editor; Hagras, Hani, Advisory Editor; Kóczy, László T., Advisory Editor; Kreinovich, Vladik, Advisory Editor; Lin, Chin-Teng, Advisory Editor; Lu, Jie, Advisory Editor; Melin, Patricia, Advisory Editor; Nedjah, Nadia, Advisory Editor; Nguyen, Ngoc Thanh, Advisory Editor; Wang, Jun, Advisory Editor
Source
Soft Computing for Problem Solving : SocProS 2018, Volume 2. 01/01/2020. 1057:91-107
Subject
Engineering
Computational Intelligence
Signal, Image and Speech Processing
Artificial Intelligence
Cloud forensic (CF)
Cloud service providers (CSP)
Cloud forensic tools (CFT)
Language
English
ISSN
2194-5357
2194-5365
Abstract
Some positive edges of cloud computing such scalability, elasticity, accessing the cloud from anywhere, and device-independent nature of cloud, has opened many doors for many intruders to carry out their mischief acts with respect to the data stored in the clouds. It is sometimes very difficult to trace out the exact fact what has happened with data, due to region effect, due to legal issues, and due to technical issues are the main and huge hurdles that exist in the present scenario; also there lies a main drawback that the present direct cloud forensics methods are not too much effective to overcome the problem. One among the buzzing technologies in today’s techno world is cloud forensics, which has its own importance in many aspects due to exponential growth to data, to reduce maintenance cost, to provide security measures to the data, and these things make the individual persons to move and attract toward cloud concept, as cloud can go with these things easily where the client has to pay for the desired flavors of services which they want to utilize. As the huge and huge amount of data is being accumulated at a place due to which it sometimes compromise may be arose when cloud service provider do not take standard measures to overcome this.