preview

Cloud Forensic Analysis Essay

Better Essays

4. Forensic Analysis in the Cloud Environment Cloud Forensics combines cloud computing and digital forensics. It is concerned with computer forensics with some consideration to network/intrusion forensics. Computer forensic focus on using procedures to create audit trails based on the residing data. Network forensic focus on analyzing network traffic and gathering information by monitoring that traffic to extract or collect information that might be considered a possible evidence. Intrusion forensic is concerned with investigating possible intrusions to computers or networks [4] [5]. A Cloud crime is any crime where a Cloud might be the object of, subject of, or tool used in that crime [12]. The Cloud is the object when the CSP is the target of the crime act, the subject when it’s where the crime was committed, and the tool if it is used to conduct or plan the crime, where a Cloud that is used to attack another cloud is called a Dark Cloud. Cloud forensics isn’t necessarily carried on when there’s only a crime. There are several usages of the cloud forensics [12][20], which include:  Investigations – when a cloud crime or a security violation takes place, where there’s collaboration with the law fore to investigate suspected transactions and operations to provide admissible evidence to the court.  Troubleshooting – to target different problems and trace events and hosts to find the root cause of certain events, preventing repeated incidents, assessing the performance of

Get Access