Digital Forensic in Cloudsim

  • Jagruti Shah
  • L. G. Malik
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 31)


Digital forensic is the method of providing digital evidence in order to prove the crime in digital world. In context of cloud environment the term digital forensics becomes more challenging due to dynamic and decentralized nature of cloud. The research proposes the digital forensic technique using Cloudsim. Cloud simulator is a powerful tool for modeling, simulating and carry out experimentation. This research presents digital forensic technique in context of cloud environment using cloudsim. The scenario of crime is created by hacking the client’s sensitive data, which is stored in cloud. The tiled bitmap algorithm is used to detect tampering of database on cloud server which presents the potential evidence. Also the proposed method is used to store the file on cloud server using timestamp and encryption method to avoid hacking. The research focuses on one of the category of crime that is tampering of data on cloud server.


Cloudsim Tiled bitmap 


  1. 1.
    Birk, D., Wegener, C.:Technical issues of forensic investigations in cloud computing environments. In: Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) Oakland, CA, USA (2011)Google Scholar
  2. 2.
    Shah, J.J., Malik, L.G.: An approach towards digital forensic framework for cloud. In: Advance Computing Conference (IACC), pp. 798–801. 21–22 Feb 2014Google Scholar
  3. 3.
    Calheiros, R.N., Ranjan, R., De Rose, C.A.F., Buyya, R.: CloudSim: a novel framework for modeling and simulation of cloud computing infrastructures and servicesGoogle Scholar
  4. 4.
    Pavlou, K.E., Snodgrass, R.T.: The tiled bitmap forensic analysis algorithm. IEEE Trans. knowl. Data Eng. 22, 590–601 (2010)CrossRefGoogle Scholar
  5. 5.
    Dykstra, J., Sherman, A.T.: Understanding issues in cloud forensics: two hypothetical case studies. J. Netw. Forensics 3(1), 19–31 (2011). (Autumn)Google Scholar
  6. 6.
    Grisspos, G., storer, T., Glisson, W.B.: Calm before the storm: the challenges of cloud computing in digital forensics. Int. J. Digit. Crime Forensics 4(2), 28–48 (2012)CrossRefGoogle Scholar
  7. 7.
    Belorkar, A., Geethakumari, G.: Regeneration of events using system snapshots for cloud forensic analysis. In: India Conference (indicon), vol. 16–18, pp. 1–4 (2011)Google Scholar
  8. 8.
    Dykstra, J., Sherman, A.T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques. Digit. Invest. 9, S90–S98 (2012)CrossRefGoogle Scholar
  9. 9.
    Dykstra, J., Sherman, A.T.: Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform. In: Digital Investigation. The Proceedings of the Thirteenth Annual DFRWS Conference 13th Annual Digital Forensics Research Conference, vol. 10 (Supplement), pp. S87–S95 (2013)Google Scholar
  10. 10.
    Zafarullah, Z., Anwar, F., Anwar, Z.: Digital forensics for eucalyptus. In: Frontiers of Information Technology (FIT), IEEE, pp. 110–116. 19–21 Dec (2011)Google Scholar
  11. 11.
    Geethakumari, G., Belorkar, A.: Regenerating cloud attack scenarios using LVM2 based system snapshots for forensic analysis. Int. J. Cloud Comput. Serv. Sci. (IJ-CLOSER) 1(3): 134–141 (2012). (ISSN: 2089-3337)Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.G.H. Raisoni College of EngineeringNagpurIndia

Personalised recommendations