Authentication Framework for Cloud Machine Deletion
Today Digital Investigation on the cloud platform is a challenging task. As cloud follows notion of pay as you demand people are attracted to adopting this technology. But an unclear understanding of control, trust and transparency are the challenges behind the less adoption by most companies. Investigation in the cloud platform is hard to collect the strong evidences because resource allocation, dynamic network policy are facilitated on demand request fulfillment. This is why, it is difficult to perform forensic analysis in such a virtualized environment because the state of the system changes frequently. Even to prevent the deletion of system on cloud is a tough task. This paper will cover all the theoretical concepts of cloud along with the challenges presented in NIST guidelines. Through this paper, we explore the existing frameworks, loopholes, and suggest some possible solutions that will be a roadmap for forensic analysis in future.
KeywordsDigital investigation Cloud Forensic Virtualized NIST
The Trademarks, product names, company names, screenshots referred in this paper are acknowledged to their respective owners.
- 1.Pooja Dubey, Vineeta Tiwari, Shweta Chawla.: Proposing an authentication mechanism for Prevention of Cloud machine Deletion. In proceedings of Internation Journal of Advance Research and Innovative Ideas in Education, Vol. 2, Issue. 3, India (2016).Google Scholar
- 2.Deevi Radha Rani, G. Geethakumari.: An Efficient Approach to Forensic Investigation in Cloud using VM Snapshots. In proceedings of International Conference on Pervasive Computing, India (2015).Google Scholar
- 3.BKSP Kumar Raju Alluri, Geethakumari G.: A Digital Forensic Model for Introspection of Virtual Machines in Cloud Computing. IEEE, India 2015.Google Scholar
- 4.Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun.: Assisted Deletion of Related Content. ACM, Switzerland (2014).Google Scholar
- 5.Mr. Digambar Powar, Dr. G. Geethakumari.: Digital Evidence Detection in Virtual Environment for Cloud Computing. ACM, India (2012).Google Scholar
- 6.Saibharath S, Geethakumari G.: Cloud Forensics: Evidence Collection and Preliminary Analysis. IEEE, (2015).Google Scholar
- 7.Mr. Chandrashekhar S. Pawar, Mr. Pankaj R. Patil, Mr. Sujitkumar V. Chaudhari.: Providing Security and Integrity for Data Stored In Cloud Storage. ICICES, India (2014).Google Scholar
- 8.Curtis Jackson, Rajeev Agrawal, Jessie Walker, William Grosky.: Scenario-based Design for a Cloud Forensics Portal. IEEE, (2015).Google Scholar
- 9.NIST, NIST Cloud Computing Forensic Science Challenges. National Institute of Standards and Technology Interagency or Internal Report 8006, (2014). Google Scholar