Forensic Investigation of data in cloud environment with virtual objects

Authors:

Michael G,Sangeetha.S,Akilesh JS,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00016

Keywords:

Cloud Computing,Cyber Crime,Digital Evidences,Forensics Solutions,

Abstract

Virtualization is the heart of business nowadays as this holds the key to the development of the world in terms of advancement in technology. It is often noted as the medium through which the single physical device can be used to emulate several virtual copies which can function as stateful entity. These machines are capable of running on their own as in a physical machine where the storage system is often encapsulated and not visible from the base layer. As the technology matures, the crimes associated with it also mutates which is not in the best intent of the innovators. To curb these crimes in cloud environment, forensics investigation must be wellequipped. An attempt has been made in this project to investigate the forensic analysis of data in cloud environment specifically on Amazon Web Services EC2 instances by leveraging the tools from ThreatResponse project. Advanced cloud forensic capabilities help an organization to adapt to challenges and result in improved overall security for the systems.

Refference:

I. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
II. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June, 2016
III. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
IV. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
V. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
VI. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., “Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences”, volume 9, Issue 3, Pg No S32-S35, 2016
VII. Pothumani, S., Sriram, M., Sridhar , “Various schemes for database encryption-a survey”, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
VIII. Priya N. Sridhar, J. Sriram, M. “Vehicular cloud computing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
IX. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume9 Issue 2. April – June, 2016

View | Download