The forensics is the application of digital forensics science in the cloud computing environment. technically, it consist of hybrid different approaches for the generation of digital evide
A 500-700 word, double spaced paper, written in APA format, showing sources and a bibliography. You will be graded on the content and completeness of this policy based on the specifications given for the topic attached.
CLOUD FORENSICS
Security measures
Definition
The forensics is the application of digital forensics science in the cloud computing environment. technically, it consist of hybrid different approaches for the generation of digital evidence. It involves interactions among the clouds for facilitation among internal and external investigation. It is considered as legal implication of the tenant situation.
cloud computing
The delivery of cloud computing as service opposed to the product with the three types:
Saas (Software as a services)
Paas (Platform as a services)
Iaas (Infrastructure as a services)
Importance of cloud
The significance of security in computing and associated systems is of utter importance to the success of these undertakings. It is as a result of the noticeable opportunities existent in the field of cloud forensics that makes it of great importance. It is very important in
Social media
Communications
Traditional route
Identification
Collection
Organization
Presentation
Opportunities
The existing opportunities in the cloud forensics include,
The abundance of data available and continuously being availed for the development of the system.
Possibility for further and greater cost optimization
CONFLICT IN CLOUD
CLOUD
Location independence
Rapid elasticity
FORENSIC
Discovery of computable jurisdiction
Data reliability
Multi-tasking
General abstract
Data structure
Evidence preservation data integrity
Chain of custody
Chain of attributes
CHALLENGES FACE BY CLOUD
There are different challenges faced by the cloud forensics such as:
Storage system is no more local
Every cloud server contains files from different users.
Even if the data relates to a specific identification, separating it from other users data is considered as more difficult.
Other than corporate social responsibility there are no usual evidence which relates to the specific data files.
Healthcare, business, or any other security which relates to the data.
,
Running Head: CLOUD FORENSICS 2
CLOUD FORENSICS 2
Cloud Forensics:
Name:
Institution:
Date:
CLOUD FORENSICS
References
Alex, M. E., & Kishore, R. (2017). Forensics framework for cloud computing. Computers & Electrical Engineering, 60, 193-205. Retrieved from: http://isiarticles.com/bundles/Article/pre/pdf/155769.pdf
Chen, L., Takabi, H., & Le-Khac, N. A. (Eds.). (2019). Security, Privacy, and Digital Forensics in the Cloud. John Wiley & Sons. Retrieved from: https://www.wiley.com/en-us/Security%2C+Privacy%2C+and+Digital+Forensics+in+the+Cloud-p-9781119053286
Pichan, A., Lazarescu, M., & Soh, S. T. (2015). Cloud forensics: Technical challenges, solutions and comparative analysis. Digital investigation, 13, 38-57. Retrieved from: https://espace.curtin.edu.au/handle/20.500.11937/33937
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.