Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Journal Title: International Journal of engineering Research and Applications - Year 2017, Vol 7, Issue 2
Abstract
Cloud Computing is a heavily evolving domain in technology. Many public and private entities are shifting their workstations on the cloud due to its robust, remote, virtual environment. Due to the enormity of this domain, it has become increasingly easier to carry out any sort of malicious attacks on such cloud platforms. There is a very low research done to develop the theory and practice of cloud forensics. One of the main challenges includes the inability to collect enough evidence from each and every subscriber of a Cloud Service Provider(CSP) and thus not being able to trace out the roots of the malicious activity committed. In this paper we compare past research done in this field and address the gaps and loopholes in the frameworks previously suggested. Overcoming these, our system/framework facilitates the collection, organization, and thereby the analysis of the evidence sought, hence preserving the essential integrity of the sensitive and volatile data.
Authors and Affiliations
Devashree Shirude, Shivani Soman, Ved Paranjape, Geet Pradhan
Design and Analysis of Total Elbow Replacement Joint
The total elbow replacement joint is a surgical process of to replace the human arm joint into artificial joint. In this paper to present the investigation of various materials used like copper, stainless steel, titanium...
Relations among Some Polygonal Numbers and a Nasty Number of the Form Six Times a Perfect Square
In this paper, we discover some relations among polygonal numbers and a nasty number by applying the solution of the standard equation 2 2 2 Z 6X Y
Data Fusion Algorithms with State Delay and Missing Measurements
In wireless sensor networks and other engineering systems, there are situations wherein some delays occur in data transmission and some measurements might be randomly missing. This would cause inaccuracies in Kalman filt...
High Performance and Low power VLSI CMOS Circuit Designs using ONOFIC Approach
Leakage power dissipation a major concern for scaling down portable devices. Improving high performance with reduced power consumption and chip area are the main constraint for designing VLSI CMOS circuits. In this paper...
Power System Stability Analysis of SMIB using Artificial Bee Colony Optimization
Due to complexity in the power system there is always a loss of the stability due to the fault. Whenever a fault is intercepted in system, the whole system goes to severe transients. These transients cause oscillation in...