Green shading indicates the types of provisions available on each service type and highlights which provisions are not available for each type. It is noted that on a local machine all the services are available and can be activated with ease compared to those in the cloud. Description of table entries for in-depth appreciation. (Networking In a local environment, access to machines on the network is readily available, two examples of which are switches and routers. Access to all traffic passing through the network and analysis can be processed as part of the collection of as much data as possible is used, even the CSP (cloud services provider) does not have this type of data, because it does not have to record all the traffic that passes through the network, since user data is confidential. and the CSP cannot record, store and analyze them. The CSP may only apply the Intrusion Detection System (IDS) or an Intrusion Prevention System (PDS) solution to the network, which only analyzes the traffic for malicious behavior and alerts the provider of such activity.Archiving Since there is no ultimate perfect cybercrime, archiving is the main reason why digital forensics came into existence in the first place as data or traces would be left behind after any attack or intrusion. Once you determine hardware access to your machine, you know exactly where your data is located, however, when using a cloud service, your data could be located anywhere, even in different states, countries, or even continents. Even if the attacker is practically next door, the residence of the data is still not far away, which means that the data cannot be recovered or so easily. This presents forensic analysts with another in a series of dead ends. Since storage is at the heart of computer forensics...... half of the paper ......Discovery and Cloud Computing: Control of ESI in the Cloud, 2010Dan Morrill , Cloud Computing Makes Forensics Easier , 2008Dejan L, Cloud forensics: An Overview, 2014Dykstra J., Damien R, Forensic Collection of Electronic Evidence from Infrastructure as a Service Cloud Computing, 2012ELSEVIER, Digital Investigation 10, 2013Gardner Inc, Cyber Forensics in the Cloud, 2010Gartner Inc. , Cloud computing will be as influential as e-business, June 26, 2008INFOSEC Institute, overview-cloud-forensics, 2012International journal of Cyber Security and Digital Forensics (IJCSDF) 2(2) 77-94, 2013John JB, Cloud Computing : another Digital Forensic Challenge, 2009 Robinson RM, et al, Cyber Security and Information Systems October 2013 Taylor M, et al, forensic investigation of cloud computing systems, 2011 Zawoad S, “Digital Forensics in the Cloud”, Securing the Cloud, 2013
tags