Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/300478
Title: Analysis and Design of a Secured FRAMEWORK for the Forensics Logs in Cloud COMPUTING EnvirONMENT
Researcher: Pandi Gayatri S
Guide(s): Shah Saurabh
Keywords: Computer Science
Computer Science Cybernetics
Engineering and Technology
University: C.U. Shah University
Completed Date: 2020
Abstract: iii newlineAbstract newlineCloud computing has been popularly adopted by the government organizations, newlinecom- mercial and public entities due to the significant economic benefits delivered by newlineit. The security issues faced in the different layers of the cloud is a major concern of newlineevery single user who employs cloud. Due to the issues in security layers of cloud newlinecomputing environ- ment, it has become a favorable environment for the cyber newlinecriminals to perform crimes. The forensic investigators face major problems in newlinecollecting the evidences due to the dy- namic and distributed nature of cloud. The newlineability of cloud forensics investigators to carry out the investigation depends newlinecompletely on the tools and methods used to acquire the appropriate digital evidence newlinefrom a device. The current digital forensic methods, tools and framework used to newlineconduct a digital investigation cannot meet the requirements and the standards for the newlinenew technologies deployed on cloud environment. During an inci- dent response newlineinvolving the cloud, logs play a very crucial role is finding the evidences of past newlinecrimes. Logs are commonly congregated by the cloud service providers or by some newlinethird party layers which are governed by the cloud service providers. Present-day newlineinfrastructures and procedures can have main issues of evidence integrity and newlinerepudiation while investigating cloud-based crime. Security of the logs is a crucial issue newlineas the logs can be tampered accidentally or intentionally by an employee in the cloud newlineservice provider s organization or by the forensic investigator, thus maligning the newlineevidence in case a cyber- crime, is committed through the cloud service provider s newlineinfrastructure. The malicious oppugner can also conspire with the cloud service newlineprovider or the forensic investigator to erase or malign the logs that are generated for newlineone s own criminal activity. newlineTo address such issues, a framework is developed which generates the virtual instance newlinelogs and aids in verifying whether the logs are tampered or not. Verification process newlineconfirms tha
Pagination: 142 p.
URI: http://hdl.handle.net/10603/300478
Appears in Departments:Department of Computer Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File123.73 kBAdobe PDFView/Open
certificates.pdf51.73 kBAdobe PDFView/Open
chapter_1.pdf192.74 kBAdobe PDFView/Open
chapter_2.pdf401.47 kBAdobe PDFView/Open
chapter_3.pdf134.81 kBAdobe PDFView/Open
chapter_4.pdf205.83 kBAdobe PDFView/Open
chapter_5.pdf326.29 kBAdobe PDFView/Open
chapter_6.pdf251.09 kBAdobe PDFView/Open
chapter_7.pdf122.96 kBAdobe PDFView/Open
preliminary pages.pdf123.73 kBAdobe PDFView/Open
title.pdf56.86 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: