loading page

A novel approach of cloud computing security using forensics techniques
  • Muskan Khan,
  • Chauhang Wahnghauhang Wahng,
  • Mumta Lulwani
Muskan Khan

Corresponding Author:muskan.khankn@gmail.com

Author Profile
Chauhang Wahnghauhang Wahng
Department of computer science, Univeristy of manday
Mumta Lulwani


Using cloud computing, businesses can adopt IT without incurring a significant upfront cost. The Internet has numerous benefits, but model security remains a concern, which affects cloud embracing negatively. The security challenge gets too difficult underneath data center, while additional dimensions such as model design, multitenancy, elasticity, and the layers dependency stack have been added to the problem scope. We present a thorough examination of the cloud security challenge in this article. We looked at the issue from the standpoints of network infrastructure: cloud-provided features, cloud consumers, and cloud service delivery methods. Based on this research, we developed an in-depth characterization of the data protection challenge and recommended security solutions that should address the critical aspects of the issue. Cloud computing is an exploding field of research that relies on distributing computing power instead of using dedicated computers or smart devices. Most of the growth in this sector is attributed to the indispensability of electronic and digital gadgets and the shift from a traditional IT subscription model to a unique cloud model. Cloud computing offered a significant danger and difficulty for information system projects, but it also provided them with several possibilities to improve their data processing. It has also been noted that cloud users and consumers do not yet have the necessary forensic skills to detect illegal activity in the cloud. Although the cloud offers potential technological and economic advantages, consumers have been reluctant to adopt it primarily due to security concerns and the difficulty of conducting an appropriate investigation into the cloud. Some study has been done in this area, and strategies for conducting forensic investigations have been proposed. In this research paper, we begin by analyzing the intrusion detection progress made by other academics, and then we analyze and evaluate our conclusions in order to assess the potential difficulties that cloud forensics face based on these findings.