2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA) 2018
DOI: 10.1109/iceca.2018.8474838
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing Digital Forensic challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Log files, one of the most crucial evidence artefacts in an investigation, must be retrieved, preserved, and maintained securely with their hash values to ensure their integrity. Research in cloud forensics has shown that log files retrieval, preservation, and maintaining the chain of custody are the primary concerns in this field [6,7,15,16].…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Log files, one of the most crucial evidence artefacts in an investigation, must be retrieved, preserved, and maintained securely with their hash values to ensure their integrity. Research in cloud forensics has shown that log files retrieval, preservation, and maintaining the chain of custody are the primary concerns in this field [6,7,15,16].…”
Section: Background and Literature Reviewmentioning
confidence: 99%
“…Even though the cloud model is composed of essential characteristics such as on-demand self-service, where a customer can unilaterally access computing capabilities, including server time and network storage without needing human interaction, Services such as measured service, resource pooling, broad network access, and rapid elasticity are other essential characteristics that the cloud model offers that constitute challenges to digital forensics in different domains. There are several issues and challenges that digital forensics is faced with, including technical [12], legal [13], and resource [14].…”
Section: Core Digital Forensic Challengesmentioning
confidence: 99%
“…Owing to the combination of mobile computing and cloud computing and use of wireless communication, we face many challenges in mobile cloud computing, such as limited resources for mobile devices, stability challenge occurring due to limitation of wireless network, cost of network access going high various times in mobile cloud computing, elasticity challenge, security and privacy challenge, bandwidth of channel, energy efficiency, quality of service etc. [13] [41].…”
Section: Challenges In Mobile Cloud Computingmentioning
confidence: 99%