Retaliation an incident of data crime using digital forensic proficiency on cloud territory

Authors

  • Vadetay Saraswathi Bai Research Scholar, Dept CSE, SOE&T, SPMVV
  • Sudha T Department Computer Science, SPMVV

Keywords:

Cloud data, digital forensic, intelligent forensics, digital tactic, digital intelligence

Abstract

Without some indication of empirical testing in relation to the ideas and processes connected with its generation, the courts make no presumption that digital evidence is credible, as they do with other sorts of evidence. Because of the issue of trustworthiness, courts pay special attention to how electronic evidence is gathered, particularly the process by which data is captured and kept. Previous process models tended to concentrate on a single aspect of digital forensic practice, such as law enforcement, and lacked a formal explanation. We believe that this approach has hampered the development of widely acknowledged standards and methods, which are critical in the field of digital forensics. This work proposes a generic process model as a first step toward building such a widely acknowledged standard for the collecting of digital evidence, which is a core digital forensic activity.

Downloads

Download data is not yet available.

References

Blueprint for the Intercloud- protocols and formats for Cloud Computing Interoperability," by D. Bernstein, E. Ludvigson, K. Sankar, S. Diamond, and M. Morrow, in Proc. 4th Int. Conf. Internet Web Appl. Serv., May 2009, pp. 328–336.

Gao L, X. Wang, Y. Xu, and Q. Zhang, "Spectrum Trading in Cognitive Radio Networks: A Contract-theoretic Modeling, IEEE Journal of Specialized Areas Communications, vol. 29, no. 4, pp. 843–855, April 2011.

Hosseinalipour S and Dai H (2017) Options-based sequential auctions for dynamic cloud resource allocation," IEEE International Conference on Communications (ICC), May 2017, pp. 1–6 in Proceedings of the IEEE International Conference on Communications (ICC), May2017.

Jaya prakash Ramsaran (2014) Cloud Computing: Benefits and Challenges [ONLINE].https://www.linkedin.com/pulse/20140921193928- 23699310-cloud-computing-benefits-and-challenges. Accessed 15 Dec 2016

Lampe U, M. Siebenhaar, A. Papageorgiou, D. Schuller, and R. Steinmetz, "Maximizing cloud provider profit from equilibrium price auctions," IEEE 5th International Conference on Cloud Computing, pp. 83–90, June 2012.

Min W, X. Zhang, J. Choi, and K. G. Shin, "Exploiting spectrum heterogeneity in the dynamic spectrum market," IEEE Trans. Mobile Compute., vol. 11, no. 12, December 2012, pp. 2020–2032.

NIST Cloud Computing Forensic Science Working Group. (Draft NISTIR 8006), 2014. NIST Cloud Computing Forensic Science Challenges

Rao VPGS, and Prasad AS (2012) A Combinatorial Auction Mechanism for Multiple Resource Procurement in Cloud Computing," in Proc. 12th Int. Conf. Intell. Syst. Design Appl., Nov. 2012, pp. 337–344.

Wang W, Liang B and B. Li, "Revenue maximisation with dynamic auctions in iaas cloud markets," in Proc. IEEE/ACM 21st Int. Symp. Quality Serv. (IWQoS), June2013, pp. 1–6.

Zhang Y, D. Niyato, P. Wang, and E. Hossain, "Auction-based resource allocation in cognitive radio systems," IEEE Communications Magazine, November 2012, vol. 50, no. 11, pp. 108–120.

Downloads

Published

2022-05-15

How to Cite

Vadetay Saraswathi Bai, & Sudha T. (2022). Retaliation an incident of data crime using digital forensic proficiency on cloud territory. International Journal of Life Sciences, 79–83. Retrieved from https://ijlsci.in/ls/index.php/home/article/view/642

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.