Log-based cloud forensic techniques: A comparative study

2Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing is one of the most recent advancements in the field of distributed computing. It has gained a lot of attention due to its on demand, pay-per-use service, and all time availability, reliability, and scalability. Although it offers numerous advantages, but due to its multi-tenant architecture, it is prone to various malicious attacks and illegal activities. Cloud service provider (CSP) takes the responsibility to secure customers’ data against such attacks. In the event of such malicious activities, CSP aims to trace the intruder. Cloud forensic techniques help in identifying the attacker along with proper evidence in cloud platform. Components of clouds such as log records are then analyzed to track for such detrimental activities. In this paper, some existing log-based cloud forensic techniques have been widely studied. The detailed comparative analysis has been done for the various techniques based on their advantages and limitations. By exploring the limitations and advantages of the existing approaches, future research areas have been identified.

Cite

CITATION STYLE

APA

Santra, P., Roy, A., Midya, S., Majumder, K., & Phadikar, S. (2018). Log-based cloud forensic techniques: A comparative study. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 4, pp. 49–59). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-10-4600-1_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free