Cyber Forensic Investigation and Exploration on Cloud Computing Environment

α
Mani Megalai S
Mani Megalai S
σ
Capt. Dr. S Santhosh Baboo
Capt. Dr. S Santhosh Baboo
ρ
S. Mani Megalai
S. Mani Megalai
α Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya

Send Message

To: Author

Cyber Forensic Investigation and Exploration on Cloud Computing Environment

Article Fingerprint

ReserarchID

CSTBZK544

Cyber Forensic Investigation and Exploration on Cloud Computing Environment Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

Cloud service providers are providing more services on demand. Usage of Cloud in IT Industry, Educational Institution, Social network, Medical Field and other business Industry are tremendously increased. This increases the more criminal activity on cloud. There is a need for forensic capabilities which support investigations of crime in cyber cloud. We need better secured model for cloud deployment and forensic investigation techniques to extract evidence from cloudbased environments in case of any cyber attack. This paper discusses the comprehensive models that provides cyber Forensics capabilities on cloud computing.

References

4 Cites in Article
  1. P Cunt,Garrison Digital Forensics for Network, Internet and Cloud Computing.
  2. Tony Krone (2005). High-Contact Cultures.
  3. Kim-Kwang Raymond Choo,Russell Smith,Rob Cusker (2007). Future Directions in Technology-Enabled Crime: 2007-09.
  4. Cheng Yan Cybercrime Forensics System in Cloud Computing.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Mani Megalai S. 2015. \u201cCyber Forensic Investigation and Exploration on Cloud Computing Environment\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 15 (GJCST Volume 15 Issue B1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
C.2.4, C.2.1
Version of record

v1.2

Issue date

March 17, 2015

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 8179
Total Downloads: 2231
2026 Trends
Related Research

Published Article

Cloud service providers are providing more services on demand. Usage of Cloud in IT Industry, Educational Institution, Social network, Medical Field and other business Industry are tremendously increased. This increases the more criminal activity on cloud. There is a need for forensic capabilities which support investigations of crime in cyber cloud. We need better secured model for cloud deployment and forensic investigation techniques to extract evidence from cloudbased environments in case of any cyber attack. This paper discusses the comprehensive models that provides cyber Forensics capabilities on cloud computing.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Cyber Forensic Investigation and Exploration on Cloud Computing Environment

Capt. Dr. S Santhosh Baboo
Capt. Dr. S Santhosh Baboo
S. Mani Megalai
S. Mani Megalai

Research Journals