Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
BioCore Group
2017
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/17718/1/fskkp-2017-ghani-proactive%20model%20for%20locating.pdf http://umpir.ump.edu.my/id/eprint/17718/ https://biocoreopen.org/ijbb/previous-issue.php |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Malaysia Pahang |
Language: | English |
id |
my.ump.umpir.17718 |
---|---|
record_format |
eprints |
spelling |
my.ump.umpir.177182018-05-16T04:14:22Z http://umpir.ump.edu.my/id/eprint/17718/ Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing Ahmed, Abdulghani Ali Chua, Xue Li QA75 Electronic computers. Computer science The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages against the possible drawbacks of losing control on resources, applications and data storage. Despite the advancement of cloud storage and the advantageous it brings to all computer users, cloud storage is still subjected to misuse of malicious users and criminals. This includes the use of cloud storage for storing and exchanging illegal material and for committing botnet attacks. In fact, increasing number of crimes against cloud storage makes the investigation process of extracting and collecting cybercrime evidences in cloud forensics more challenging. Although a number of researches and solutions are proposed to address cloud computing security, several studies and surveys reported that security in cloud computing still posing several challenges to the researchers. Loss of control over the data stored in cloud computing is one of the security challenge in that clouds. Location of data storage in the cloud and the multi tenancy of customers on cloud servers are all representing security concerns. At the same time, cloud technology nowadays is also creating challenges for forensic practitioners. This paper reviews the current challenges in cloud forensic and propose a proactive model to improve the process of locating and collecting cybercrime evidences in cloud computing. The objective of this paper is two pronged. Former is to study the existing digital evidence collection methodology, the location and the data fragments left on user’s computer prior to the usage of cloud storage application. Last is find the location and the data fragments left on user’s computer prior to the usage of cloud storage application for new cloud storage. BioCore Group 2017 Article PeerReviewed application/pdf en cc_by http://umpir.ump.edu.my/id/eprint/17718/1/fskkp-2017-ghani-proactive%20model%20for%20locating.pdf Ahmed, Abdulghani Ali and Chua, Xue Li (2017) Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing. International Journal of Biotechnology and Bioengineering, 3 (2). p. 60. ISSN 2475-3432 https://biocoreopen.org/ijbb/previous-issue.php |
institution |
Universiti Malaysia Pahang |
building |
UMP Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Malaysia Pahang |
content_source |
UMP Institutional Repository |
url_provider |
http://umpir.ump.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Ahmed, Abdulghani Ali Chua, Xue Li Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing |
description |
The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages against the possible drawbacks of losing control on resources, applications and data storage. Despite the advancement of cloud storage and the advantageous it brings to all computer users, cloud storage is still subjected to misuse of malicious users and criminals. This includes the use of cloud storage for storing and exchanging illegal material and for committing botnet attacks. In fact, increasing number of crimes against cloud storage makes
the investigation process of extracting and collecting cybercrime evidences in cloud forensics more challenging. Although a number of researches and solutions are proposed to address cloud computing security, several studies and surveys reported that security in cloud computing still posing several challenges to the researchers. Loss of control over the data stored in cloud computing is one of the security challenge in that clouds. Location of data storage in the cloud and the multi tenancy of customers on cloud servers are all representing security concerns. At the same time, cloud technology nowadays is also creating
challenges for forensic practitioners. This paper reviews the current challenges in cloud forensic and propose a proactive model to improve the process of locating and collecting cybercrime evidences in cloud computing. The objective of this paper is two pronged. Former is to study the existing digital evidence collection methodology, the location and the data fragments left on user’s computer prior to the usage of cloud storage application. Last is find the location and the data fragments left on user’s
computer prior to the usage of cloud storage application for new cloud storage. |
format |
Article |
author |
Ahmed, Abdulghani Ali Chua, Xue Li |
author_facet |
Ahmed, Abdulghani Ali Chua, Xue Li |
author_sort |
Ahmed, Abdulghani Ali |
title |
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing |
title_short |
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing |
title_full |
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing |
title_fullStr |
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing |
title_full_unstemmed |
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing |
title_sort |
proactive model for locating and collecting cybercrime evidences on cloud computing |
publisher |
BioCore Group |
publishDate |
2017 |
url |
http://umpir.ump.edu.my/id/eprint/17718/1/fskkp-2017-ghani-proactive%20model%20for%20locating.pdf http://umpir.ump.edu.my/id/eprint/17718/ https://biocoreopen.org/ijbb/previous-issue.php |
_version_ |
1643668254446583808 |