2019
DOI: 10.11648/j.ajnc.20190801.13
|View full text |Cite
|
Sign up to set email alerts
|

Forensics and Digital Criminal Investigation Challenges in Cloud Computing and Virtualization

Abstract: I'll address the fundamentals of Cloud Computing and Virtualization. The types of cloud computing deployment models and their relationship with the responsibility of the users are developed. The fundamentals of digital criminal investigation applied to Cloud Computing are discussed, and the most significant challenges are presented to criminal investigation and forensic sciences in this type and digital environment. The implications of Virtualization used in Cloud Computing in Criminal Investigation and Forens… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…12 Mobile forensics a type of digital forensics, is a field that is still under development, and due to the varying nature of smartphone operating systems, extracting useful data as evidence proves to be a challenge. 13 Existing research in the field of forensics focuses mainly on analyzing log files, recovering data from memory, 14,15 databases, 16,17 file-systems, 18 network traffic, 19 etc. During mobile evidence collection, investigators mainly focus on collecting Message (SMS and MMS) data, call records, Location details, images, SIM card details, etc.…”
Section: Literature Reviewmentioning
confidence: 99%
“…12 Mobile forensics a type of digital forensics, is a field that is still under development, and due to the varying nature of smartphone operating systems, extracting useful data as evidence proves to be a challenge. 13 Existing research in the field of forensics focuses mainly on analyzing log files, recovering data from memory, 14,15 databases, 16,17 file-systems, 18 network traffic, 19 etc. During mobile evidence collection, investigators mainly focus on collecting Message (SMS and MMS) data, call records, Location details, images, SIM card details, etc.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The respondents indicated issues associated with encryption, the dynamic nature of virtual environments, and shared and multi-tenant systems. The discussion highlighted the importance of working with cloud service providers and suggested policies like transparency reports and forensic methods that protect privacy [57].…”
Section: Theme 2: Virtualisation and Shared Resourcesmentioning
confidence: 99%
“…The respondents indicated various related factors that created problems in conducting a successful assessment of cloud computing. In this regard, regulatory data privacy [56], virtualization and shared resources [57], loss of physical control over infrastructure [58], following rules and regulations, and the significance of working with cloud service providers stand out. Meanwhile, these interview sessions were effective in collecting valuable recommendations from respondents to enhance the current standards and jurisdiction related to forensic investigation.…”
Section: Summary Of Findingsmentioning
confidence: 99%
“…• Services with metrics, cloud systems automatically control and optimize the use of resources, leveraging a metering resource at levels of abstraction appropriate to the types of services (for example, storage, processing, bandwidth and active user accounts). The use of resources can be monitored, controlled and reported, providing transparency to the provider and the consumer of the services used (Brandao, 2019).…”
Section: Main Characteristics Of Cloud Computing Technologymentioning
confidence: 99%