Role of Cloud Forensics in Cloud Computing

  • Shaik Khaja MohiddinEmail author
  • Yalavarthi Suresh Babu
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1057)


Some positive edges of cloud computing such scalability, elasticity, accessing the cloud from anywhere, and device-independent nature of cloud, has opened many doors for many intruders to carry out their mischief acts with respect to the data stored in the clouds. It is sometimes very difficult to trace out the exact fact what has happened with data, due to region effect, due to legal issues, and due to technical issues are the main and huge hurdles that exist in the present scenario; also there lies a main drawback that the present direct cloud forensics methods are not too much effective to overcome the problem. One among the buzzing technologies in today’s techno world is cloud forensics, which has its own importance in many aspects due to exponential growth to data, to reduce maintenance cost, to provide security measures to the data, and these things make the individual persons to move and attract toward cloud concept, as cloud can go with these things easily where the client has to pay for the desired flavors of services which they want to utilize. As the huge and huge amount of data is being accumulated at a place due to which it sometimes compromise may be arose when cloud service provider do not take standard measures to overcome this.


Cloud forensic (CF) Cloud service providers (CSP) Cloud forensic tools (CFT) 


  1. 1.
    Hu, et al.: Advantages and disadvantages of different cloud types (2011) Google Scholar
  2. 2.
    Broadhurst, R.: Developments in the global law enforcement of cyber crime. Policing Int. J. Police Strat. Manage. 29(2), 408–433 (2006)CrossRefGoogle Scholar
  3. 3.
    Liles, S., Rogers, M., Hoebich, M.: A survey of the legal issues facing digital forensic experts. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics V. Springer, Heidelberg, Germany, pp. 267–276 (2009)CrossRefGoogle Scholar
  4. 4.
    Khaja Mohiddin, S., Yalavarthi, S.B., Kondragunta, V.: An analytical comparative approach of cloud forensic tools during cyber attacks in cloud. In: Bansal, J., Das, K., Nagar, A., Deep, K., Ojha, A. (eds.) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 817. Springer, Singapore (2019)Google Scholar
  5. 5.
    Wu, H., Ding, Y., Winer, C., Yao, L.: Network security for virtual machine in cloud computing. In: 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT), pp. 18–21. IEEE Computer Society, Washington, DC, USA (2010)Google Scholar
  6. 6.
    Morsy, M.A., Grundy, J., Müller, I.: An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop. APSEC, Sydney, Australia (2010)Google Scholar
  7. 7.
    Garfinkel, T., Rosenblum, M.: When virtual is harder than real: security challenges in virtual machine based computing environments. In: Proceedings of the 10th Conference on Hot Topics in Operating Systems, Santa Fe, NM, vol. 10, pp. 227–229. USENIX Association Berkeley, CA, USA (2005) Google Scholar
  8. 8.
    Wang, Z., Jiang, X.: HyperSafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 380–395. IEEE Computer Society, Washington, DC, USA (2010)Google Scholar
  9. 9.
    Winkler, V.: Securing the cloud: cloud computer security techniques and tactics. Elsevier Inc., Waltham, MA (2011)Google Scholar
  10. 10.
    Dawoud, W., Takouna, I., Meinel, C.: Infrastructure as a service security: challenges and solutions. In: The 7th International Conference on Informatics and Systems (INFOS), Potsdam, Germany, pp. 1–8. IEEE Computer Society, Washington, DC, USA (2010)Google Scholar
  11. 11.
    Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, Chicago, Illinois, USA, pp. 199–212. ACM, New York, NY, USA (2009)Google Scholar
  12. 12.
    Townsend, M.: Managing a security program in a cloud computing environment. In: Information Security Curriculum Development Conference, Kennesaw, Georgia, pp. 128–133. ACM, New York, NY, USA (2009)Google Scholar
  13. 13.
    Grobauer, B., Walloschek, T., Stocker, E.: Understanding cloud computing vulnerabilities. IEEE Secur. Priv. 9(2), 50–57 (2011)CrossRefGoogle Scholar
  14. 14.
    Ertaul, L., Singhal, S., Gökay, S.: Security challenges in cloud computing. In: Proceedings of the 2010 International conference on Security and Management SAM’10, pp. 36–42. CSREA Press, Las Vegas, USA (2010)Google Scholar
  15. 15.
    ENISA: Cloud Computing: benefits, risks and recommendations for information security (2009)Google Scholar
  16. 16.
    Jansen, W.A.: Cloud hooks: security and privacy issues in cloud computing. In: Proceedings of the 44th Hawaii international conference on system sciences, Koloa, Kauai, HI, pp. 1–10. IEEE Computer Society, Washington, DC, USA (2011)Google Scholar
  17. 17.
    Jasti, A., Shah, P., Nagaraj, R., Pendse, R.: Security in multi-tenancy cloud. In: IEEE International Carnahan Conference on Security Technology (ICCST), KS, USA, pp. 35–41. IEEE Computer Society, Washington, DC, USA (2010)Google Scholar
  18. 18.
    Cloud Security Alliance: Top threats to cloud computing V1.0. Available: (2010)
  19. 19.
  20. 20.
    Hashizume, K., Rosado, D.G., Fernández-Medina, E., et al.: J. Internet Serv. Appl. 4, 5 (2013). Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  • Shaik Khaja Mohiddin
    • 1
    Email author
  • Yalavarthi Suresh Babu
    • 2
  1. 1.Department of CSEAcharya Nagarjuna UniversityNamburu, GunturIndia
  2. 2.Deparment of CSEJKCGunturIndia

Personalised recommendations