Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Improved Technique for Simulation of Digital Forensic Architecture Framework in Cloud  
  Authors : Smita Kamble; Sulabha Patil; Rajiv Dharaskar
  Cite as:

 

Digital forensic is part of forensic science that implicitly covers crime that is related to computer technology. computer and network forensics have evolved to assure proper presentation of computer crime evidentiary data into court. The main purpose of forensic is to identify the origin while maintaining the chain of custody in order to enable the legal process to take its due course. Digital forensics is essential for the successful prosecution of digital criminals which involve diverse digital devices such as computer system devices, network devices, mobile devices and storage devices. If any computer related incident happens, fundamental questions to answer are when and where the incident occurred and, from which device, system and geographic location did the incident originate. In this paper a cyber crime, digital evidence investigation requires a special procedures and techniques in order to be used and be accepted in court of law. Generally, the goals of these special processes are to identify the origin of the incident reported as well as maintaining the chain of custody so that the legal process can take its option.While digital investigations have recently become more common, physical investigations have existed for thousands of years and the experience from them can be applied to the digital world.

 

Published In : IJCSN Journal Volume 5, Issue 3

Date of Publication : June 2016

Pages : 489-496

Figures :08

Tables : --

Publication Link : Improved Technique for Simulation of Digital Forensic Architecture Framework in Cloud

 

 

 

Smita Kamble : Computer Engineering, Department of M.TECH CSE Tulsiramji Gaikwad-Patil College of Engineering and Technology Nagpur, India

Sulabha Patil : Computer Engineering, Department of M.TECH CSE Tulsiramji Gaikwad-Patil College of Engineering and Technology Nagpur, India

Rajiv Dharaskar : Computer Engineering, Department of M.TECH CSE Tulsiramji Gaikwad-Patil College of Engineering and Technology Nagpur, India

 

 

 

 

 

 

 

SQL Injection, K-Means Algorithm, Aprioric Algorithm

Data warehousing is defined as a process of centralized data management and retrieval.Data warehousing represents an ideal vision of maintaining a central repository of all organizational data. Centralization of data is needed to maximize user access and analysis.

 

 

 

 

 

 

 

 

 

[1] Kent, K., et al., Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication 800-86. 2006, National Institute of Standards and Technology, Gaithersburg, MD. [2] Palmer, G., A Road Map for Digital Forensic Research. 2001, Digital Forensic Research Workshop (DFRWS): Utica, New York. [3] Carrier, B., A Hyphotesis-based Approach to Digital Forensic Investigations, in Center for Education & Research in Information Assurance & Security. 2006, Purdue University: West Lafayette. p.190. [4] Casey, E., Digital Evidence and Computer Crime. Second ed. 2004 Elsevier Academic Press. [5] Stephenson, P., A Comprehensive Approach to Digital Incident Investigation, in Elsevier Information Security Technical Report. 2003, Elsevier Advanced Technology. [6] Oghazi, P., B. Pålsson, and K. Tano. An attempt to apply traceability to grinding circuits. in Conference in Mineral Processing. 2007. Luleå, Sweden. [7] Golan, E., et al., Traceability in the U.S. Food Supply: Economic Theory and Industry Studies, in Agricultural Economic Report 2004. [8] Clayton, R., Anonymity and Traceability in Cyberspace., in Computer Laboratory, Darwin College. 2005, University of Cambridge. p. 189. [9] Siti Rahayu, S., Y. Robiah, and S. Shahrin, Mapping Process of Digital Forensic Investigation Framework. International Journal of Computer Science and Network Security, 2008. 8(10): p. 163-169. [10] Carrier, B. and E. Spafford, Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence, 2003. 2(2). [11] Ciardhuáin, S.Ó., An Extended Model of Cybercrime Investigations. International Journal of Digital Evidence, 2004. 3(1). [12] Beebe, N.L. and J.G. Clark. A Hierarchical, Objectives-Based Framework for the Digital Investigations Process. in Digital Forensic Research Workshop. 2004. Baltimore. [13] Siti Rahayu, S., et al., Advanced Trace Pattern For Computer Intrusion Discovery. Journal of Computing, 2010. (6): p. 1-8. [14] Prosise, Chris, et al. Incident Response and Computer Forensics, Second Edition. McGraw-Hill Osborne Media, 2003. [15] Schiffman, Mike, et al. Hacker.s Challenge 2: Test Your Network Security & Forensic Skills. McGraw- Hill Osborne Media, 2002. [16] Schweitzer, Douglas. Incident Response: Computer Forensics Toolkit. Wiley, 2003. [17] Zalewski, Michal. Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks. No Starch, 2005. [18] United States National Institute of Justice Technical Working Group for Electronic Crime Scene Investigation. Electronic Crime Scene Investiga-tion: A Guide for First Responders, July 2001. [19] Ricci I. S. C. (2006) Digital Forensics Framework that incorporate legal issues. Available from www.sciencedirect.com Accessed on October 20, 2010 [20] Perumal S., (2009) Digital Forensics Model Based on Malaysian Investigation Process, IJCSNS Vol. 9 No. 8 Available from www.sciencedirect.com [21] Salemat S. R. Yusof R. Sahib S. (2008) Mapping Process of Digital Forensic Investigation Framework. International Journal of Computer Science and Network Security Vol. 8 NO 10 Available from www.sciencedirect.com [22] Garfinkel S., (2010) Digital forensics research: The next 10 years. Digital Investigations 7. 2010 S64-S73. Available from www.sciencedirect.com Accessed on August 20, 2010 [23] Ricci I. S. C. (2006) Digital Forensics Framework that incorporate legal issues. Available from www.sciencedirect.com Accessed on October 20, 2010 [24] R. Ahmad, Z. Yunos, S. Sahib, and M. Yusoff. (2012). Perception on Cyber Terrorism: A Focus Group Discussion Approach. Journal of Information Security, Vol. 03, No. 03, pp. 231-237. DOI: 10.4236/jis.2012.33029 [25] Prasad, K., (2012). Cyberterrorism: Addressing the Challenges for Establishing an International Legal Framework. In Proceedings of the 3rd Australian Counter Terrorism Conference, December 3-5, Novotel Langley Hotel, Perth, Western Australia.