2High-Performance Computing-Based Scalable “Cloud Forensics-as-a-Service” Readiness Framework Factors—A Review

Srinivasa Rao Gundu 1, Charanarur Panem2* and S. Satheesh3

1Keysoft Computer Education, Mehdipatnam, Hyderabad, India

2Karwar Government Engineering College, Karwar, Majali, India

3Malineni Lakshmaiah Women’s Engineering College, Pulladigunta, Guntur, India

Abstract

In present days, usage of cloud technology has increased. Cloud technology has become an integral part of human life today. This on-demand service provision flexibility support of cloud technology has attracted many companies to relay. It does not need to purchase servers, databases, and their related sophisticated technologies for the establishment of any new company. Simultaneously, security of data in the cloud is much alarming and requires some attention. Cybercriminals have many ways to intrude into the user’s systems with the help of the user’s cloud logs, switches, and routers. Cloud is distributing computing and one can never think of cloud computing without these mechanisms. Still, the security mechanisms are in infancy. Identifying the cyber culprit’s cybernetic evidence plays an important role. Cloud service providers generally do not provide the cloud logs and virtual machine instances to the cloud security analyst. Cybernetic evidence is enough for cyber culprits to abuse cloud computations at any moment. There is a need to strengthen the security mechanisms to avoid the intrusion of cyber ...

Get Cyber Security and Network Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.