Critical Retrospection of Security Implication in Cloud Computing and Its Forensic Applications

Author:

Raghavendra S.1ORCID,Srividya Putty2ORCID,Mohseni Milad3ORCID,Bhaskar Seelam Ch. Vijaya4ORCID,Chaudhury Sushovan5ORCID,Sankaran K. Sakthidasan6ORCID,Singh Bhupesh Kumar7ORCID

Affiliation:

1. Department of Information and Communication Technology, Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal 576104, India

2. Department of ECE, University College of Engineering, Osmania University, Hyderabad, India

3. Islamic Azad University (IAU), Tabriz, Iran

4. Department of IT, Maturi Venkata Subba Rao Engineering College, Hyderabad, India

5. Department of Computer Science and Engineering, University of Engineering and Management, Kolkata, India

6. Department of ECE, Hindustan Institute of Technology and Science, Chennai, India

7. Arba Minch Institute of Technology, Arba Minch University, Arba Minch, Ethiopia

Abstract

Using cloud computing, businesses can adopt IT without incurring a significant upfront cost. The Internet has numerous benefits, but model security remains a concern, which affects cloud embracing negatively. The security challenge gets too difficult underneath data center, while additional dimensions such as model design, multitenancy, elasticity, and the layers dependency stack have been added to the problem scope. We present a thorough examination of the cloud security challenge in this article. We looked at the issue from the standpoints of network infrastructure: cloud-provided features, cloud consumers, and cloud service delivery methods. Based on this research, we developed an in-depth characterization of the data protection challenge and recommended security solutions that should address the critical aspects of the issue. Cloud computing is an exploding field of research that relies on distributing computing power instead of using dedicated computers or smart devices. Most of the growth in this sector is attributed to the indispensability of electronic and digital gadgets and the shift from a traditional IT subscription model to a unique cloud model. Cloud computing offered a significant danger and difficulty for information system projects, but it also provided them with several possibilities to improve their data processing. It has also been noted that cloud users and consumers do not yet have the necessary forensic skills to detect illegal activity in the cloud. Although the cloud offers potential technological and economic advantages, consumers have been reluctant to adopt it primarily due to security concerns and the difficulty of conducting an appropriate investigation into the cloud. Some study has been done in this area, and strategies for conducting forensic investigations have been proposed. In this research paper, we begin by analyzing the intrusion detection progress made by other academics, and then we analyze and evaluate our conclusions in order to assess the potential difficulties that cloud forensics face based on these findings.

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference76 articles.

1. Edge computing vs. cloud computing: an overview of big data challenges and opportunities for large enterprises;G. S. Sriram;International Research Journal of Modernization in Engineering Technology and Science,2022

2. Formally Validated Authentication Protocols for WSN

3. Suppleness of multi-tenancy in cloud computing: advantages, privacy issues, and risk factors;N. Goyal

4. COVID-19: Challenges and its Technological Solutions using IoT

5. A scalable and energy-efficient MAC protocol for sensor and actor networks

Cited by 10 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Enhancing IoT Network Capabilities through Edge Computing Strategies for Real-Time Data Analytics and Efficient Information Processing;2024 10th International Conference on Communication and Signal Processing (ICCSP);2024-04-12

2. Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges;Sensors;2024-01-10

3. Optimizing Forensic Investigation and Security Surveillance with Deep Reinforcement Learning Techniques;2023 International Conference on Data Science, Agents & Artificial Intelligence (ICDSAAI);2023-12-21

4. An Analysis of Signature-Based Components in Hybrid Intrusion Detection Systems;2023 Intelligent Computing and Control for Engineering and Business Systems (ICCEBS);2023-12-14

5. OML-PCM: optical multi-level phase change memory architecture for embedded computing systems;Engineering Research Express;2023-12-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3