2020
DOI: 10.1007/978-981-15-2071-6_3
|View full text |Cite
|
Sign up to set email alerts
|

Development and Design Strategies of Evidence Collection Framework in Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…Moreover, they discussed the limitations and drawbacks of existing forensic solutions, providing future research directions. Khan and Varma [ 23 ] focused their research on evidence collection and cloud forensic architecture, also implementing a machine learning-based forensic method for the SaaS and PaaS delivery architecture. A fundamental issue often faced by forensic investigators in an investigation is how to carefully and efficaciously collect, preserve, and analyze digital evidence.…”
Section: Related Surveysmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, they discussed the limitations and drawbacks of existing forensic solutions, providing future research directions. Khan and Varma [ 23 ] focused their research on evidence collection and cloud forensic architecture, also implementing a machine learning-based forensic method for the SaaS and PaaS delivery architecture. A fundamental issue often faced by forensic investigators in an investigation is how to carefully and efficaciously collect, preserve, and analyze digital evidence.…”
Section: Related Surveysmentioning
confidence: 99%
“…These frameworks focus on data collection, analysis, architecture, and the enhancement of investigation efficiency within cloud environments, addressing challenges specific to different cloud service models. Such a comprehensive approach aligns with the dynamic nature of cloud-based digital forensics, ensuring experts can effectively navigate diverse challenges while upholding ethical and legal standards [ 23 , 148 ].…”
Section: Strategizing For Emerging Challenges In Cloud Digital Forensicsmentioning
confidence: 99%
“…The proposed OTKA-AED framework's key generation time is depicted in [Fig. 3.6] and compared to the state-of-the-art approaches, such as the secure data sharing scheme developed by [14], the ranked searchable symmetric encryption scheme developed by [15], and the KP-ABE developed by [16][17][18][19]. The chart shows that, in comparison to current methods, the key generation time is significantly shorter.…”
Section: Encryption Of Attributes Based On Authorization Tagsmentioning
confidence: 99%
“…In addition to this approach, the authors of [48] suggested using a compatible data synchronization model that synchronizes data variables between VM and persistent storage for forensic use. The authors of [49] proposed a model for data collection and forensic Cloud construction, by using feature-based machine learning and prioritization on VMs. The authors proposed a forensic approach for PaaS and SaaS models to design and develop new digital technologies and improve research efficiency and may provide information to law enforcement personnel.…”
Section: An Integrated Conceptual Digital Forensic Frameworkmentioning
confidence: 99%