2016
DOI: 10.1002/sec.1688
|View full text |Cite
|
Sign up to set email alerts
|

A survey on cloud forensics challenges and solutions

Abstract: In recent years, cloud computing has gained popularity, and it is now used to support various areas of human life. Cloud forensics has been introduced to help forensic investigators find potential evidence against cloud criminal activities and maintain the security and integrity of the information stored in the cloud. While great research in the area has been carried out concerning challenges and solutions, the research on methodologies and frameworks is still in its infancy. This article focuses on the method… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 37 publications
(32 citation statements)
references
References 60 publications
0
32
0
Order By: Relevance
“…However, designing cloud services capable to assist a cloud investigation process is of vital importance and various research efforts concentrate on these directions [8,9]. In addition, digital forensics methods cannot support an investigation in cloud environments since the particular environments introduce many differences compared to traditional IT environments [1,10].…”
Section: Cloud Forensic Investigationmentioning
confidence: 99%
See 1 more Smart Citation
“…However, designing cloud services capable to assist a cloud investigation process is of vital importance and various research efforts concentrate on these directions [8,9]. In addition, digital forensics methods cannot support an investigation in cloud environments since the particular environments introduce many differences compared to traditional IT environments [1,10].…”
Section: Cloud Forensic Investigationmentioning
confidence: 99%
“…Authors stated that the preservation stage should also run concurrently with the other two stages or should be included in the chain of custody. Based on the comparison framework and the literature review conducted in [10], Simou et al [9] proposed a generic process for cloud-forensic investigation including the steps of Incident Confirmation, Incident Identification, Collection-Acquisition, Examination-Analysis, and Presentation. They were stating that understanding the cloud forensic investigation process is of vital importance in order to design and implement cloud forensic-enabled services.…”
Section: Proposed Cloud Forensic Investigation Processmentioning
confidence: 99%
“…When technologies are applied to activity diagrams, a new service is implemented which is cloud forensic-enabled and ready to support a cloud forensic investigation. For suggesting the adequate technologies per forensic constraint, taking as input the deployment model, the service model and the missing forensic-related constraints, we have grouped a list of possible solutions on our previous papers that categorize the existing solutions based on these criteria [26]. A snapshot of this table is shown in Table 6.…”
Section: Selection Of Technologiesmentioning
confidence: 99%
“…A detailed review at the respective methods has been also conducted and presented in [26,27]. This analysis revealed the challenges and the open issues related to cloud forensics and their possible solutions.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation