Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing

The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmed, Abdulghani Ali, Chua, Xue Li
Format: Article
Language:English
Published: BioCore Group 2017
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/17718/1/fskkp-2017-ghani-proactive%20model%20for%20locating.pdf
http://umpir.ump.edu.my/id/eprint/17718/
https://biocoreopen.org/ijbb/previous-issue.php
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Pahang
Language: English
id my.ump.umpir.17718
record_format eprints
spelling my.ump.umpir.177182018-05-16T04:14:22Z http://umpir.ump.edu.my/id/eprint/17718/ Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing Ahmed, Abdulghani Ali Chua, Xue Li QA75 Electronic computers. Computer science The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages against the possible drawbacks of losing control on resources, applications and data storage. Despite the advancement of cloud storage and the advantageous it brings to all computer users, cloud storage is still subjected to misuse of malicious users and criminals. This includes the use of cloud storage for storing and exchanging illegal material and for committing botnet attacks. In fact, increasing number of crimes against cloud storage makes the investigation process of extracting and collecting cybercrime evidences in cloud forensics more challenging. Although a number of researches and solutions are proposed to address cloud computing security, several studies and surveys reported that security in cloud computing still posing several challenges to the researchers. Loss of control over the data stored in cloud computing is one of the security challenge in that clouds. Location of data storage in the cloud and the multi tenancy of customers on cloud servers are all representing security concerns. At the same time, cloud technology nowadays is also creating challenges for forensic practitioners. This paper reviews the current challenges in cloud forensic and propose a proactive model to improve the process of locating and collecting cybercrime evidences in cloud computing. The objective of this paper is two pronged. Former is to study the existing digital evidence collection methodology, the location and the data fragments left on user’s computer prior to the usage of cloud storage application. Last is find the location and the data fragments left on user’s computer prior to the usage of cloud storage application for new cloud storage. BioCore Group 2017 Article PeerReviewed application/pdf en cc_by http://umpir.ump.edu.my/id/eprint/17718/1/fskkp-2017-ghani-proactive%20model%20for%20locating.pdf Ahmed, Abdulghani Ali and Chua, Xue Li (2017) Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing. International Journal of Biotechnology and Bioengineering, 3 (2). p. 60. ISSN 2475-3432 https://biocoreopen.org/ijbb/previous-issue.php
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ahmed, Abdulghani Ali
Chua, Xue Li
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
description The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages against the possible drawbacks of losing control on resources, applications and data storage. Despite the advancement of cloud storage and the advantageous it brings to all computer users, cloud storage is still subjected to misuse of malicious users and criminals. This includes the use of cloud storage for storing and exchanging illegal material and for committing botnet attacks. In fact, increasing number of crimes against cloud storage makes the investigation process of extracting and collecting cybercrime evidences in cloud forensics more challenging. Although a number of researches and solutions are proposed to address cloud computing security, several studies and surveys reported that security in cloud computing still posing several challenges to the researchers. Loss of control over the data stored in cloud computing is one of the security challenge in that clouds. Location of data storage in the cloud and the multi tenancy of customers on cloud servers are all representing security concerns. At the same time, cloud technology nowadays is also creating challenges for forensic practitioners. This paper reviews the current challenges in cloud forensic and propose a proactive model to improve the process of locating and collecting cybercrime evidences in cloud computing. The objective of this paper is two pronged. Former is to study the existing digital evidence collection methodology, the location and the data fragments left on user’s computer prior to the usage of cloud storage application. Last is find the location and the data fragments left on user’s computer prior to the usage of cloud storage application for new cloud storage.
format Article
author Ahmed, Abdulghani Ali
Chua, Xue Li
author_facet Ahmed, Abdulghani Ali
Chua, Xue Li
author_sort Ahmed, Abdulghani Ali
title Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_short Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_full Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_fullStr Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_full_unstemmed Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_sort proactive model for locating and collecting cybercrime evidences on cloud computing
publisher BioCore Group
publishDate 2017
url http://umpir.ump.edu.my/id/eprint/17718/1/fskkp-2017-ghani-proactive%20model%20for%20locating.pdf
http://umpir.ump.edu.my/id/eprint/17718/
https://biocoreopen.org/ijbb/previous-issue.php
_version_ 1643668254446583808