Cyber Forensic Investigation and Exploration on Cloud Computing Environment

1
Mani Megalai S
Mani Megalai S
2
Capt. Dr. S Santhosh Baboo
Capt. Dr. S Santhosh Baboo
3
S. Mani Megalai
S. Mani Megalai
1 SCSVMV University, Kancheepuram

Send Message

To: Author

GJCST Volume 15 Issue B1

Article Fingerprint

ReserarchID

CSTBZK544

Cyber Forensic Investigation and Exploration on Cloud Computing Environment Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Cloud service providers are providing more services on demand. Usage of Cloud in IT Industry, Educational Institution, Social network, Medical Field and other business Industry are tremendously increased. This increases the more criminal activity on cloud. There is a need for forensic capabilities which support investigations of crime in cyber cloud. We need better secured model for cloud deployment and forensic investigation techniques to extract evidence from cloudbased environments in case of any cyber attack. This paper discusses the comprehensive models that provides cyber Forensics capabilities on cloud computing.

4 Cites in Articles

References

  1. P Cunt,Garrison Digital Forensics for Network, Internet and Cloud Computing.
  2. Tony Krone (2005). High-Contact Cultures.
  3. Kim-Kwang Raymond Choo,Russell Smith,Rob Cusker (2007). Future Directions in Technology-Enabled Crime: 2007-09.
  4. Cheng Yan Cybercrime Forensics System in Cloud Computing.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Mani Megalai S. 2015. \u201cCyber Forensic Investigation and Exploration on Cloud Computing Environment\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 15 (GJCST Volume 15 Issue B1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
C.2.4, C.2.1
Version of record

v1.2

Issue date

March 17, 2015

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8127
Total Downloads: 2155
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Cloud service providers are providing more services on demand. Usage of Cloud in IT Industry, Educational Institution, Social network, Medical Field and other business Industry are tremendously increased. This increases the more criminal activity on cloud. There is a need for forensic capabilities which support investigations of crime in cyber cloud. We need better secured model for cloud deployment and forensic investigation techniques to extract evidence from cloudbased environments in case of any cyber attack. This paper discusses the comprehensive models that provides cyber Forensics capabilities on cloud computing.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Cyber Forensic Investigation and Exploration on Cloud Computing Environment

Capt. Dr. S Santhosh Baboo
Capt. Dr. S Santhosh Baboo
S. Mani Megalai
S. Mani Megalai

Research Journals