CFP last date
01 July 2024
Call for Paper
August Edition
CAE solicits high quality original research papers for the upcoming August edition of the journal. The last date of research paper submission is 01 July 2024

Submit your paper
Know more
Reseach Article

Comparitive Study of Cloud Forensics Tools

by Sameena Naaz, Faizan Ahmad Siddiqui
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 3
Year of Publication: 2016
Authors: Sameena Naaz, Faizan Ahmad Siddiqui

Sameena Naaz, Faizan Ahmad Siddiqui . Comparitive Study of Cloud Forensics Tools. Communications on Applied Electronics. 5, 3 ( Jun 2016), 24-30. DOI=10.5120/cae2016652258

@article{ 10.5120/cae2016652258,
author = { Sameena Naaz, Faizan Ahmad Siddiqui },
title = { Comparitive Study of Cloud Forensics Tools },
journal = { Communications on Applied Electronics },
issue_date = { Jun 2016 },
volume = { 5 },
number = { 3 },
month = { Jun },
year = { 2016 },
issn = { 2394-4714 },
pages = { 24-30 },
numpages = {9},
url = { },
doi = { 10.5120/cae2016652258 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2023-09-04T19:54:43.654218+05:30
%A Sameena Naaz
%A Faizan Ahmad Siddiqui
%T Comparitive Study of Cloud Forensics Tools
%J Communications on Applied Electronics
%@ 2394-4714
%V 5
%N 3
%P 24-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

In recent years, cloud computing has become popular as a cost-effective and efficient computing paradigm. Cloud computing may well become one the most transformative technologies in the history of computing. Cloud service providers and customers have yet to establish adequate forensic capabilities that could support investigations of criminal activities in the cloud [1]. It is impossible to avoid the vulnerabilities and criminal targeting of cloud environments which demands an understanding of how digital forensic investigations of the cloud can be accomplished. Unfortunately, today’s cloud computing architectures are not designed for security and forensics. To date, very little research has been done to develop the theory and practice of cloud forensics. Many factors create difficulty in forensics investigations in a cloud environment. Numerous clients stay hesitant to move their business IT base totally to the cloud. One of the primary worries of clients is Cloud security and the risk of the obscure. Cloud Service Providers (CSP) empower this observation by not giving their clients a chance to see what is behind their “Virtual shade" implies how our data or information is dealt with at the back end [2]. This paper talks about existing examination ventures and highlights the open issues and future headings in cloud crime scene investigation research territory. It has been demonstrated that the efficient methodology towards understanding the nature and difficulties of cloud crime scene investigation will permit researchers to look at conceivable secure arrangement approaches, prompting expanded trust on and reception of distributed computing, particularly in business, medicinal services, and national security. This thus will prompt lower cost and long haul advantage to the general public overall [3].

  1. Keyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie, “CLOUD FORENSICS,” Advances in Digital Forensics VII, IFIP AICT 361, pp. 35–46, 2011. IFIP International Federation for Information Processing 2011.
  2. Dominik Birk, “Technical Challenges of Forensic Investigations in Cloud Computing Environment” January 12, 2011.
  3. Shams Zawoad, Ragib Hasan, “Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems,” University of Alabama at Birmingham ISSN- 35294-1170 March 2014.
  4. Willie E. May, “NIST Cloud Computing Forensic Science Challenges” National Institute of Standards and Technology Interagency or Internal Report 8006 (June 2014).
  5. Keyun Ruan, Joe Carthy, Tahar Kechadi and Mark Crosbie, “Cloud_Forensics: An Overview”, Advances in Digital Forensics VII, IFIP International Federation for Information Processing 2011.
  6. Vladimir Dobrosavljević, Mladen Veinović, Ivan Barać, “Standard Implementation in Cloud Forensics” Singidunum University, Danijelova 32, Belgrade, Serbia 2015.
  7. Dorey P.G., Leite A, “Commentary: Cloud computing – A security problem or solution?” Information Security Technical Report, 16 (3–4), pp. 89–96, Elsevier (2011)
  8. S. D. Wolthusen, “Overcast: Forensic Discovery in Cloud Environments,” Fifth International Conference on IT Security Incident Management and IT Forensics,pp. 3-9, 2009.
  9. Xath Cruz, “The Basics of Cloud Forensics,” 2012.
  10. Yunting Lei, Yuyin Cui, “Research on Live Forensics in Cloud Environment” The Third Research Institute of Ministry of Public Security Shanghai, China. (3CA 2013).
  11. Dykstra J, Sherman AT, “Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools, trust, and techniques” Digital Investigation 2012, (Suppl. S90–S98). The Proceedings of the Twelfth Annual DFRWS Conference.
  12. Josiah Dykstra and Alan T. Sherman, “Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform,” Cyber Defense Lab, Department of CSEE University of Maryland, Baltimore County (UMBC), April 2013.
  13. Josiah Dykstra and Alan T. Sherman, “Understanding Issues In Cloud Forensics: Two Hypothetical Case Studies,” ADFSL Conference on Digital Forensics, Security and Law, 2011.
  14. Cellebrite, “Extracting Legally Defensible Evidence From The Cloud,” Explaining UFED Cloud Analyzer Extraction and Analysis Processes.
  15. Cellebrite, “UFED Cloud Analyser” UFED-Cloud-Analyzer-DataSheet.pdf
  16. Europe Proceedings of the Third Annual DFRWS Europe Forensic analysis of cloud-native artifacts Vassil Roussev, Shane McCulley. DFRWS 2016.
Index Terms

Computer Science
Information Sciences


Cloud computing Digital forensics Cloud forensics Live forensics.