A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 8
Abstract
Digital forensics is a class of forensic science interested with the use of digital information produced, stored and transmitted by various digital devices as source of evidence in investigations and legal proceedings. Digital forensics can be split up to several classes such as computer forensics, network forensics, mobile forensics, cloud computing forensics, and IoT forensics. In recent years, cloud computing has emerged as a popular computing model in various areas of human life. However, cloud computing systems lack support for computer forensic investigations. The main goal of digital forensics is to prove the presence of a particular document in a given digital device. This paper presents a comprehensive survey of various frameworks and solutions in all classes of digital forensics with a focus on cloud forensics. We start by discussing different forensics classes, their frameworks, limitations and solutions. Then we focus on the methodological aspect and existing challenges of cloud forensics. Moreover, the detailed comparison discusses drawbacks, differences and similarities of several suggested cloud computing frameworks providing future research directions.
Authors and Affiliations
Mohammed Khanafseh, Mohammad Qatawneh, Wesam Almobaideen
A Semantic Interpretation of Unusual Behaviors Extracted from Outliers of Moving Objects Trajectories
The increasing use of location-aware devices has led to generate a huge volume of data from satellite images and mobile sensors; these data can be classified into geographical data. And traces generated by objects moving...
The Reality of Applying Security in Web Applications in Academia
Web applications are used in academic institutions, such as universities, for variety of purposes. Since these web pages contain critical information, securing educational systems is as important as securing any banking...
PRIVACY-PRESERVING CLUSTERING USING REPRESENTATIVES OVER ARBITRARILY PARTITIONED DATA
The challenge in privacy-preserving data mining is avoiding the invasion of personal data privacy. Secure computa- tion provides a solution to this problem. With the development of this technique, fully homomorphic encry...
Face Recognition Based on Improved SIFT Algorithm
People are usually identified by their faces. Developments in the past few decades have enabled human to automatically do the identification process.Now, face recognition process employs the advanced statistical science...
Multiple Vehicles Semi-Self-driving System Using GNSS Coordinate Tracking under Relative Position with Correction Algorithm
This paper describes a simple and low-cost semiself- driving system which is constructed without cameras or image processing. In addition, a position correction method is presented by using a vehicle dynamics. Convention...