A Model of Cloud Forensic Application With Assurance of Cloud Log
Open Access
- 1 September 2021
- journal article
- research article
- Published by IGI Global in International Journal of Digital Crime and Forensics
- Vol. 13 (5), 114-129
- https://doi.org/10.4018/ijdcf.20210901.oa7
Abstract
The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. Forensic investigation is a complex process, where a set of activities are involved. The cloud log history plays an important role in the investigation and evidence collection. The existing model in cloud log information requires more security. The proposed model used for forensic application with the assurance of cloud log that helps the digital and cloud forensic investigators for collecting forensic scientific evidences. The cloud preservation and cloud log data encryption method is implemented in java. The real-time dataset, network dataset results tell that attacks with the highest attack type are generic type, and a case conducted chat log will predict the attacks in advance by keywork antology learning process, NLP, and AI techniques.Keywords
This publication has 7 references indexed in Scilit:
- Load balancing of energy cloud using wind driven and firefly algorithms in internet of everythingJournal of Parallel and Distributed Computing, 2020
- Forensics framework for cloud computingComputers and Electrical Engineering, 2017
- Cloud Log ForensicsACM Computing Surveys, 2016
- Cloud Forensics-A Framework for Investigating Cyber Attacks in Cloud EnvironmentProcedia Computer Science, 2016
- Introducing a Hybrid Infrastructure and Information-Centric Approach for Secure Cloud ComputingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2015
- Cybercrime and Cloud ForensicsPublished by IGI Global ,2013
- Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniquesDigital Investigation, 2012