Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing

The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages...

Full description

Bibliographic Details
Main Authors: Ahmed, Abdulghani Ali, Chua, Xue Li
Format: Article
Language:English
Published: BioCore Group 2017
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/17718/
http://umpir.ump.edu.my/id/eprint/17718/
http://umpir.ump.edu.my/id/eprint/17718/1/fskkp-2017-ghani-proactive%20model%20for%20locating.pdf
id ump-17718
recordtype eprints
spelling ump-177182018-05-16T04:14:22Z http://umpir.ump.edu.my/id/eprint/17718/ Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing Ahmed, Abdulghani Ali Chua, Xue Li QA75 Electronic computers. Computer science The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages against the possible drawbacks of losing control on resources, applications and data storage. Despite the advancement of cloud storage and the advantageous it brings to all computer users, cloud storage is still subjected to misuse of malicious users and criminals. This includes the use of cloud storage for storing and exchanging illegal material and for committing botnet attacks. In fact, increasing number of crimes against cloud storage makes the investigation process of extracting and collecting cybercrime evidences in cloud forensics more challenging. Although a number of researches and solutions are proposed to address cloud computing security, several studies and surveys reported that security in cloud computing still posing several challenges to the researchers. Loss of control over the data stored in cloud computing is one of the security challenge in that clouds. Location of data storage in the cloud and the multi tenancy of customers on cloud servers are all representing security concerns. At the same time, cloud technology nowadays is also creating challenges for forensic practitioners. This paper reviews the current challenges in cloud forensic and propose a proactive model to improve the process of locating and collecting cybercrime evidences in cloud computing. The objective of this paper is two pronged. Former is to study the existing digital evidence collection methodology, the location and the data fragments left on user’s computer prior to the usage of cloud storage application. Last is find the location and the data fragments left on user’s computer prior to the usage of cloud storage application for new cloud storage. BioCore Group 2017 Article PeerReviewed application/pdf en cc_by http://umpir.ump.edu.my/id/eprint/17718/1/fskkp-2017-ghani-proactive%20model%20for%20locating.pdf Ahmed, Abdulghani Ali and Chua, Xue Li (2017) Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing. International Journal of Biotechnology and Bioengineering, 3 (2). p. 60. ISSN 2475-3432 https://biocoreopen.org/ijbb/previous-issue.php
repository_type Digital Repository
institution_category Local University
institution Universiti Malaysia Pahang
building UMP Institutional Repository
collection Online Access
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ahmed, Abdulghani Ali
Chua, Xue Li
Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
description The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages against the possible drawbacks of losing control on resources, applications and data storage. Despite the advancement of cloud storage and the advantageous it brings to all computer users, cloud storage is still subjected to misuse of malicious users and criminals. This includes the use of cloud storage for storing and exchanging illegal material and for committing botnet attacks. In fact, increasing number of crimes against cloud storage makes the investigation process of extracting and collecting cybercrime evidences in cloud forensics more challenging. Although a number of researches and solutions are proposed to address cloud computing security, several studies and surveys reported that security in cloud computing still posing several challenges to the researchers. Loss of control over the data stored in cloud computing is one of the security challenge in that clouds. Location of data storage in the cloud and the multi tenancy of customers on cloud servers are all representing security concerns. At the same time, cloud technology nowadays is also creating challenges for forensic practitioners. This paper reviews the current challenges in cloud forensic and propose a proactive model to improve the process of locating and collecting cybercrime evidences in cloud computing. The objective of this paper is two pronged. Former is to study the existing digital evidence collection methodology, the location and the data fragments left on user’s computer prior to the usage of cloud storage application. Last is find the location and the data fragments left on user’s computer prior to the usage of cloud storage application for new cloud storage.
format Article
author Ahmed, Abdulghani Ali
Chua, Xue Li
author_facet Ahmed, Abdulghani Ali
Chua, Xue Li
author_sort Ahmed, Abdulghani Ali
title Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_short Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_full Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_fullStr Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_full_unstemmed Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
title_sort proactive model for locating and collecting cybercrime evidences on cloud computing
publisher BioCore Group
publishDate 2017
url http://umpir.ump.edu.my/id/eprint/17718/
http://umpir.ump.edu.my/id/eprint/17718/
http://umpir.ump.edu.my/id/eprint/17718/1/fskkp-2017-ghani-proactive%20model%20for%20locating.pdf
first_indexed 2023-09-18T22:24:38Z
last_indexed 2023-09-18T22:24:38Z
_version_ 1777415884361433088