Final paper
A 500-700 word, double spaced paper, written in APA format, showing sources and a bibliography. You will be graded on the content and completeness of this policy based on the specifications given for the topic attached.
CLOUD FORENSICS
Security measures
Definition
The forensics is the application of digital forensics science in the cloud computing environment. technically, it consist of hybrid different approaches for the generation of digital evidence. It involves interactions among the clouds for facilitation among internal and external investigation. It is considered as legal implication of the tenant situation.
cloud computing
The delivery of cloud computing as service opposed to the product with the three types:
Saas (Software as a services)
Paas (Platform as a services)
Iaas (Infrastructure as a services)
Importance of cloud
The significance of security in computing and associated systems is of utter importance to the success of these undertakings. It is as a result of the noticeable opportunities existent in the field of cloud forensics that makes it of great importance. It is very important in
Social media
Communications
Traditional route
Identification
Collection
Organization
Presentation
Opportunities
The existing opportunities in the cloud forensics include,
The abundance of data available and continuously being availed for the development of the system.
Possibility for further and greater cost optimization
CONFLICT IN CLOUD
CLOUD
Location independence
Rapid elasticity
FORENSIC
Discovery of computable jurisdiction
Data reliability
Multi-tasking
General abstract
Data structure
Evidence preservation data integrity
Chain of custody
Chain of attributes
CHALLENGES FACE BY CLOUD
There are different challenges faced by the cloud forensics such as:
Storage system is no more local
Every cloud server contains files from different users.
Even if the data relates to a specific identification, separating it from other users data is considered as more difficult.
Other than corporate social responsibility there are no usual evidence which relates to the specific data files.
Healthcare, business, or any other security which relates to the data.
Running Head:
CLOUD FORENSICS
2
CLOUD FORENSICS 2
Cloud Forensics:
Name:
Institution:
Date:
CLOUD FORENSICS
The current trend of the ever-increasing dependency on cloud computing indicates that despite the lack of immediate need for the utilization of cloud forensics’ features, future dependence is to a great extent guaranteed (Pichan et al, 2015). Cloud computing is at its natal stages of development, though the possibility of exponential extrapolation is imminent and therefore the need for development of an appropriate cloud forensics systems to cater for the cloud computing needs when they arise (Chen et al, 2019). The significance of security in computing and associated systems is of utter importance to the success of these undertakings. It is as a result of the noticeable opportunities existent in the field of cloud forensics that makes it of great importance. The existing opportunities in the cloud forensics include, the abundance of data available and continuously being availed for the development of the system as well as the possibility for further and greater cost optimization (Alex et al, 2017). It is due to these parameters that cloud forensics is considered important going forward in the field of computing and ultimately humanity.
References
Alex, M. E., & Kishore, R. (2017). Forensics framework for cloud computing. Computers & Electrical Engineering, 60, 193-205. Retrieved from: http://isiarticles.com/bundles/Article/pre/pdf/155769
Chen, L., Takabi, H., & Le-Khac, N. A. (Eds.). (2019). Security, Privacy, and Digital Forensics in the Cloud. John Wiley & Sons. Retrieved from: https://www.wiley.com/en-us/Security%2C+Privacy%2C+and+Digital+Forensics+in+the+Cloud-p-9781119053286
Pichan, A., Lazarescu, M., & Soh, S. T. (2015). Cloud forensics: Technical challenges, solutions and comparative analysis. Digital investigation, 13, 38-57. Retrieved from: https://espace.curtin.edu.au/handle/20.500.11937/33937