logo

Advance Research Questions 2022

   

Added on  2022-10-09

6 Pages2857 Words84 Views
ADVANCE RESEARCH
ON
TOPIC: Building an extensible process model of digital
evidence on cloud computing.
RESEARCH QUESTION: How to effectively process digital forensic using
cloud computing?
ABSTRACT: Digital forensic is a part of forensic in which investigation of
evidences related to computer. This is very adoptable because of
implementation of cloud computing in this area. The organizations and providers
are prepared in a nice manner to face this kind of issue. Firstly, this research
discusses the assumptions commonly made and the evaluate a new base
process for cloud based digital forensic. The cloud forensic principles are
technical, legal and organizational dimensions. A process for response to actions
in forensic cloud computing should be given in Security Management System to
include the possibility of simulations. For digital forensic it is important that data
stores in cloud should be stored in other place as well to avoid risk from
attackers. There should be a careful application of this idea of digital forensic to
cloud computing environment to efficient combat of these cybercrimes. There is
a mention of special technological methods or tools in cloud forensic
investigation in this study. There are a number of recommendations are taken
into consideration of privacy on cloud digital forensic investigation process.
Key words: Digital forensic, cloud computing, security management system,
and cybercrimes
Literature Review
As per Du, Le-Khac and Scanlon (2017), usage of server side model can
be acting beneficial in the functional process of performing digital forensic with
the help of cloud computing. Marturana and his team members proposed a
model which was initially known as forensics as a service delivery platform. This
model is focussed on exploiting the capabilities of cloud computing in the section
of forensics [3]. The model deals with the forensic images that are which are
captured by the client side software. In this case the entire image is segmented
and hence wise fragments are created. This creation of fragments ensures that
each fragments are uploaded in smaller fragments in a manner that is parallel to
the server side platform. This is done in order to perform proper management of
the massive uploads in an efficient manner. The main job role of the server side
is to acknowledge the fragments and hence wise send the fragments to the
selected and differentiated server of the cloud. This section helps in exploiting
the distributed file system’s ability of replicating the files that are present in the
server. After this process the fragments of the images are exchanged. This
Advance Research Questions 2022_1
exchanging is performed as per the servers that are selected [7]. Hence wise
several copies of the captured image is created. This is performed in order to
provide redundancy. This section ensures that there is a possibility of performing
a remote process in the distributed commodity servers. This helps in caching in
RAM. This helps in proper processing of the imaging files. Hence wise the
required time of completing synchronization of complex and distributed images
decreases. The architectural requirement of the server side model includes the
likes of Orchestrator, a few numbers of Forensic processes and a communication
interface which helps in establishing proper communication in between server
side and the client side and vice versa [4]. This process is performed for proper
assessing of the service request and result delivery along with the internal
interface regarding the data transaction in between the cloud servers. It has
been noted that the Orchestrator is in charge of the Accepting Incoming Service
requests. Initiation of the outgoing communication process along with
Aggregating and delivering of the results are the departments that are in charge
of the Orchestrator. The activities that are responsible for receiving
acknowledgement as well as the storing of the captured images that are
fragmented in nature. Processing of the captured images are also another major
activity that is to be performed. Deletion of the retained images as well as that of
the forensics data as per the Orchestrator request is also another responsibility.
Proper delivering of the results to the orchestrator also acts as a major
responsibility of this model.
Again according to S. Nanda and R.A. Hansen (2017), the model
that can be beneficial in performing the digital forensics with the help of cloud
computing is Forensics as a service. This model is basically focused on providing
a delivery platform in a distributed manner. This model assumes that the images
that are captured by the client side software is subdivided in fragments. These
fragments are hence wise uploaded in a section that is parallel to the server side
platform. This is performed in order to efficiently manage the huge number of
files that are to be transacted. This is the main reason that this model will be
benefitting the model. The server side is said to be responsible for proper
acknowledgement of the fragments that are headed towards the selected
servers. This is done in order to perform the processing of the data and forward
the same to the destined cloud. Exploiting the file system that is capable for
replication of the data ensures that the management of the data transferring and
fragments get replicated in a proper manner. Proper exchanging of the image
fragments is considered as the main benefit of the model. Image fragments are
altered and exchanged among the servers that are selected [6]. After this
process several copies of the same are created in order to capture the images
that are rebuilt. This ensures that there is a decrease in redundancy in the
process. This decrease in redundancy also acts as a major benefit of the
Forensics as a service model. For allowing the forensics task the proper keyword
searching is to be performed. This proper key word searching enhances the
process. This is considered to be split and hence wise perform the entire data
transaction process via the parallel platform. This is considered that the entire
process is well maintained and hence wise the forensic images can be
considered as a natural unit which is to be used for performing storing process.
Usage of remote control ensures that the functional process is distributed as per
the commodity. This process enhances the methodology of caching RAM and
Advance Research Questions 2022_2
hence wise process image files. This ensures that complex forensic tasks are
performed and completed in a faster manner. The efficiency of the entire process
is increased as well. In this case the major aspect that is to be considered is that
the dependencies create and issue on the constraints. This is the major reason
that requirement of the complex distributed synchronization is felt.
The architecture and the framework of the entire model plays an
important role. The architecture of this model is highly unique and can be
distinguished from other models. The architecture is the main component that
has been creating the major difference in the operational efficiency in other
models and in Forensics as a service model. The architecture constitutes of a
central processor which is named as the Orchestrator, several remote forensic
processes are implemented as well. Communication interface is also included in
the architecture. Client side and server side of the platforms are included as well.
With the help of the architecture proper functioning of the result delivery can be
expected. This entire process is performed across the platform of cloud system.
The system orchestrator is mainly responsible for accepting of the
requests that are incoming in nature. Another major job role is to initiate the
communication process that is outgoing in nature. This process also ensures that
the aggregation of the delivering result is performed.
Methodology
The entire research process is divided in 8 major steps. The steps are
namely Selection of the research problem. In this case the research problem was
the model selection that can be used for performing digital forensics via the
cloud platform. This issue is considered to be the heart of the entire research.
The entire research process is aimed towards this topic. After this process,
extensive literature review is performed. This is considered as the secondary
research process. In this section peer reviewed journals are considered. Data
are collected from the peer reviewed journals. Another major reason of selecting
peer reviewed journals is that the data that are present in the journals are
authenticated in nature [8]. Hence arising of copyright related issues can be
eliminated. This acts as one of the prime goal of the research process. In case
copyright issues arises the entire process will be facing legal issues. Initially
qualitative data analysis is performed. In this case the basic definitions of the
concepts are known. Developing proper concept is the main goal of this section.
This performing of the qualitative secondary research will be enhancing the
entire research as this will be acting as the base of the research. After
performing of the qualitative data collection, quantitative data collection was
made. In this process the major focus is to collect numeric data. Creation of
numeric data ensures that the functioning process of the project will be getting
more precise. Gaining this preciseness acts as a major goal of the entire process.
After collecting the quantitative data the entire data is analyzed. Proper
analyzing is performed. After this section the research design will be performed.
In this section proper identification of the problems that mighty arise during the
execution of the research is analyzed. Hence wise the steps that are to be taken
to eliminate the same is also considered and decided in this case. Even
discussing regarding the conceptual structuring issues are performed in this
section [11]. After this process primary data collection is to be made. In this
section direct data will be collected from the users as well as a sampled mass.
Advance Research Questions 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Forensic Analysis 2022
|15
|1541
|23

Performing a Forensics Investigation Involving Cloud Computing
|11
|2391
|12