Reference Hub1
A Model of Cloud Forensic Application With Assurance of Cloud Log

A Model of Cloud Forensic Application With Assurance of Cloud Log

More Swami Das, A. Govardhan, Vijaya Lakshmi Doddapaneni
Copyright: © 2021 |Volume: 13 |Issue: 5 |Pages: 16
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781799867524|DOI: 10.4018/IJDCF.20210901.oa7
Cite Article Cite Article

MLA

Das, More Swami, et al. "A Model of Cloud Forensic Application With Assurance of Cloud Log." IJDCF vol.13, no.5 2021: pp.114-129. http://doi.org/10.4018/IJDCF.20210901.oa7

APA

Das, M. S., Govardhan, A., & Doddapaneni, V. L. (2021). A Model of Cloud Forensic Application With Assurance of Cloud Log. International Journal of Digital Crime and Forensics (IJDCF), 13(5), 114-129. http://doi.org/10.4018/IJDCF.20210901.oa7

Chicago

Das, More Swami, A. Govardhan, and Vijaya Lakshmi Doddapaneni. "A Model of Cloud Forensic Application With Assurance of Cloud Log," International Journal of Digital Crime and Forensics (IJDCF) 13, no.5: 114-129. http://doi.org/10.4018/IJDCF.20210901.oa7

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. Forensic investigation is a complex process, where a set of activities are involved. The cloud log history plays an important role in the investigation and evidence collection. The existing model in cloud log information requires more security. The proposed model used for forensic application with the assurance of cloud log that helps the digital and cloud forensic investigators for collecting forensic scientific evidences. The cloud preservation and cloud log data encryption method is implemented in java. The real-time dataset, network dataset results tell that attacks with the highest attack type are generic type, and a case conducted chat log will predict the attacks in advance by keywork antology learning process, NLP, and AI techniques.