Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation

GS Pandi, S Shah, KH Wandra - Procedia Computer Science, 2020 - Elsevier
Cloud computing environment offers many services which have attracted the criminals or
oppugners to commit cyber-crimes in a more sophisticated manner. Most of the crimes …

Revised forensic framework validation and cloud forensic readiness

S Simou, C Kalloniatis, S Gritzalis… - International …, 2022 - inderscienceonline.com
Cloud forensics earn more and more ground as the number of incidents in cloud
environments raise daily. Software engineers seek solutions in order to elicit and model …

A Systematic Literature Review of Latest Cloud Forensic Frameworks, Tools and Challenges

U Farooq, A Shaukat, WH Butt… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Background: Cloud computing is widely used in this era of IoTs. Cloud users utilize cloud
computing to access various cloud services. The defects in cloud services are exploited by …

A Systematic Study On Cloud Forensic Framework, Challenges And Technologies Used For Evidence Preservation

ST Pirjade, P Dhotre - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
In this study we have focused on 3 research questions and tried to do analysis of that
questions. The term" cloud computing" is wide yet ambiguous, encompassing a range of …

A Detailed Study of Advancements in Digital Forensics

G Gogia, P Rughani - The International Conference on Recent Innovations …, 2023 - Springer
Digital forensics is a complicated process with many variables. Every case tends to be
different, with varied levels of complexity. This heterogeneous nature of work comes from the …

Enhancing the operations for integrity check on virtual instance forensic logs using cuckoo filter trees

GS Pandi, S Shah, KH Wandra - International Journal of …, 2021 - inderscienceonline.com
Logs can hold pieces of evidence for the crime committed using the resources of the cloud
service provider. An oppugner can hire the virtual instances, launch an attack, commit a …