A Log-based Approach Access Secure File to Make Digital Forensics Easier on Cloud Computing

Gundecha Nilesh, Supekar Namdev, Ransing Kailas, Bhambure Ratnadip, Ritesh Thakur


Cloud computing is law means Cloud computing raises some unique law enforcement concern regarding the location of prospective digital evidence, its protection and its subsequent forensic investigation. For instance if a customer or business becomes the target of a criminal investigation. They could move from one country to another country, their working environment to a cloud environment. This would offer a means for the business to continue its routine operations while the migrated environment is forensically examined. However, this is not without threat. data can be stored somewhere in the world. Its sharing could be to several location or country. Where privacy laws are different in each country. Establishing a chain of detention for the data would become difficult or impossible if its veracity and authenticity cannot be fully determined there are also potential forensic issues when the customer or user exits a cloud application. In the proposed system, approach which using logs model to building a forensic-friendly system. Using this model we can quickly collect information from cloud for some kinds of forensic purpose and this will decrease the complexity of those kinds of forensics
Keywords: Cloud computing; Forensics; log

Full Text:


Copyright (c) 2016 Gundecha Nilesh, Supekar Namdev, Ransing Kailas, Bhambure Ratnadip, Ritesh Thakur

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


All published Articles are Open Access at  https://journals.pen2print.org/index.php/ijr/ 

Paper submission: ijr@pen2print.org