Please use this identifier to cite or link to this item:
Title: Digital Forensic Techniques for Investigation of Cybercrimes in Cloud Computing Environment
Researcher: Ezz Eldin Badawy Gad Alrab Hemdan
Guide(s): Manjaiah D.H
Keywords: Engineering and Technology,Computer Science,Computer Science Cybernetics
University: Mangalore University
Completed Date: 
Abstract: In the present days, cloud forensic techniques cannot be accomplished by way of computer and network forensic techniques in conventional IT systems because of intricate complications such as crime scene reconstruction, isolating cloud instance, data provenance, evidence segregation, and dynamic nature of cloud computing. But they can be performed in a way that is reliable with the law by developing and presenting new suitable digital forensic procedures, approaches and techniques to assist digital investigators for investigation of cloud-based crimes in legal and efficient fashion. The digital investigators have to recognize the existing techniques and procedures which are inadequate in the cloud environment where forensic acquisition and analysis process will be inversely achieved. newlineApplying digital forensic techniques in cloud computing environment are facing complex challenges and obstacles which need to be resolved to perform a convenient cloud forensics. Thus, this thesis concerns with developing proficient digital forensic techniques for investigation of cybercrimes in the cloud computing environment in forensically sound and timely manner. The aim of this research is to study and resolve the following issues: newlineand#61607; Explore and identify challenges and opportunities for performing digital forensics investigation in the cloud computing environment. A literature review is done to understand and explore the cloud forensic challenges and opportunities. newlineand#61607; Secure cloud storage with understanding and identifying data remnants that are available after accessing, using and conducting Box cloud storage as a case study and provide a method to perform the forensic investigation of this cloud storage service in forensically sound manner. To do this, a cloud forensic approach is proposed for securing cloud storage and assisting digital investigators in performing digital forensics for Box cloud storage service as a case study. newlineand#61607; Perform forensic analysis of large volume of log data to reconstruct a timeline of cybercrime even
Pagination: xvi, 211
Appears in Departments:Department of Computer Science

Files in This Item:
File Description SizeFormat 
01_title page.pdfAttached File116.5 kBAdobe PDFView/Open
02_priliminary pages.pdf711.2 kBAdobe PDFView/Open
03_chapter1.pdf479.56 kBAdobe PDFView/Open
04_chapter2.pdf873.37 kBAdobe PDFView/Open
05_chapter3.pdf1.31 MBAdobe PDFView/Open
06_chapter4.pdf1.07 MBAdobe PDFView/Open
07_chapter5.pdf1.35 MBAdobe PDFView/Open
08_chapter6.pdf1.24 MBAdobe PDFView/Open
09_chapter7.pdf1.58 MBAdobe PDFView/Open
10_chapter8.pdf1.1 MBAdobe PDFView/Open
11_chapter9.pdf137.13 kBAdobe PDFView/Open
12_bibliography.pdf209.93 kBAdobe PDFView/Open
13_list of publications.pdf431.39 kBAdobe PDFView/Open
14_synopsis.pdf979.78 kBAdobe PDFView/Open
15_abstract.pdf107.83 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.