Skip to main content

Cloud Forensics in Relation to Criminal Offences and Industrial Attacks in Mauritius

  • Conference paper
  • First Online:
  • 644 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 863))

Abstract

The cloud can be referred as an infrastructure with large data centres that gives the possibility to run and share resources on your computer, mobile phones or any other device connected with the Internet and in. In Mauritius, many companies are moving towards the cloud and cloud forensics have become important components in the field of investigation. Cloud forensics means how to investigate cybercrimes in cloud environments. Emphasis on concept of the cloud, its mode of forensics and difficulties encountered during an investigation on the cloud. Further, law implications and legislations in Mauritius for computer misuse are also being described. It is obvious that the cloud provides many advantages as described in this paper. However, along with this service, there are several challenges before extracting evidence in case of attacks. These include acquisition of evidence and its preservation, chain of custody and legislation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Hussey, D.: From Cave Paintings to IBM Cloud (2018). https://www.linkedin.com/pulse/from-cave-paintings-ibm-cloud-declan-hussy

  2. NIST: Digital Forensics in the Cloud (2013). https://pdfs.semanticscholar.org/5795/3e2dd1f572d769f1eeb4f98dc8a0ef313b4d.pdf

  3. The Mauritius Assembly: The Data Protection Bill (2017). http://mauritiusassembly.govmu.org/English/bills/Documents/intro/2017/bill1917.pdf

  4. DataGuidance: Mauritius: DPB Should in Principle Lead to EU Adequacy (2017). https://www.dataguidance.com/mauritius-data-protection-bill-principle-provide-eu-adequacy/

  5. Satapathy, S.C., et al.: Cloud Computing: Security Issues and Research Challenges (2011). https://www.ijcsits.org/papers/Vol1no22011/13vol1no2.pdf

  6. Newsroom News: AfrAsia Pioneers Successful Deployment of Cloud (2017). https://www.afrasiabank.com/en/about/newsroom/news/2017/afrasia-pioneers-successful-deployment-of-cloud-based-financial-solution-in-mauritius

  7. George Grispos: Challenges of Cloud Computing in Digital Forensics (2012). https://arxiv.org/pdf/1410.2123.pdf

  8. Steve Ranger: Introduction to Cloud Computing (2018). https://www.zdnet.com/article/what-is-cloud-computing-everything-you-need-to-know-from-public-and-private-cloud-to-software-as-a/

  9. Satapathy, S.C., et al.: Cloud Computing: Security Issues and Research Challenges (2011). https://www.ijcsits.org/papers/Vol1no22011/13vol1no2.pdf

  10. Government of Mauritius. Cybercrime strategy of Mauritius (2017). http://cert-mu.govmu.org/

  11. Martini, B., Choo, K.: Cloud Forensic Technical Challenges and Solutions: IEEE Cloud Computing, pp. 20–25 (2014)

    Google Scholar 

  12. Ruan, K., Carthy, J., Kechadi, T., Baggili, I.: Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results. Digit. Investig. 10, 34–43 (2013)

    Article  Google Scholar 

  13. Biggs: Cloud Forensics and SLA (2013). http://users.cis.fiu.edu/~fortega/df/research/Cloud%20Forensics%20II/Other%20references/Cloud%20Forensics%20Issues%20and%20Opportunities.pdf

  14. O’Shaughnessy, S., Keane, A.: Impact of Cloud Computing on Digital Forensic Investigations (2013). https://link.springer.com/content/pdf/10.1007%2F978-3-642-41148-9_20.pdf

  15. Satapathy, S.C., et al.: Cloud Computing: Security Issues and Research Challenges (2011). https://www.ijcsits.org/papers/Vol1no22011/13vol1no2.pdf

Download references

Acknowledgements

We undertake that we have the required permission to use images/dataset in the work from suitable authority and we shall be solely responsible if any conflicts arise in future.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dhanush Leelodharry .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Leelodharry, D. (2019). Cloud Forensics in Relation to Criminal Offences and Industrial Attacks in Mauritius. In: Satapathy, S., Bhateja, V., Somanah, R., Yang, XS., Senkerik, R. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 863. Springer, Singapore. https://doi.org/10.1007/978-981-13-3338-5_10

Download citation

Publish with us

Policies and ethics