Abstract

In recent years, there has been a dramatic change in attitude towards computers and the use of computer resources in general. Cloud and Edge computing have emerged as the most widely used technologies, including fog computing and the Internet of Things (IoT). There are several benefits in exploiting Cloud and Edge computing paradigms, such as lower costs and higher efficiency. It provides data computation and storage where data are processed, enables better data control, faster understanding and actions, and continuous operation. However, though these benefits seem to be appealing, their effects on computer forensics are somewhat undesirable. The complexity of the Cloud and Edge environments and their key features present many technical challenges from multiple stakeholders. This paper seeks to establish an in-depth understanding of the impact of Cloud and Edge computing-based environmental factors. Software and hardware tools used in the digital forensic process, forensic methods for handling tampered sound files, hidden files, image files, or images with steganography, etc. The technical/legal challenges and the open design problems (such as distributed maintenance, multitasking and practicality) highlight the various challenges for the digital forensics process.

Highlights

  • Cloud computing has emerged as a ubiquitous technology with new capabilities for the smooth and fast delivery of computer resources such as servers, networks, storage, applications, and services on demand with minimal management requirements [1]

  • We present a prime review paper that highlights the digital forensic process for both Cloud and Edge computing and its different challenges and open problems

  • This study has been conducted on Cloud/Edge computing systems and created a revolution in conventional computer forensic by highlighting all the related challenges and proposed solutions altogether

Read more

Summary

Introduction

Cloud computing has emerged as a ubiquitous technology with new capabilities for the smooth and fast delivery of computer resources such as servers, networks, storage, applications, and services on demand with minimal management requirements [1]. It is one of the most critical milestones in developing computer systems and technologies that can be integrated and utilized efficiently [2,3]. Edge computing’s promising features include mobility support, location awareness, very low delays, and access to users These features make Edge computing suitable for various future applications in a plethora of domains such as transportation, entertainment, wellness, health, industry, etc. There are different rules of evidence in many jurisdictions, and differences in crime and criminal offences are not consistent with some of the many legal issues in various categories

Motivation
Our Contribution
Log-Based Approach Model
Collection and Preservation Stages
The Trust Model and Trust Cloud
Isolation Techniques
Secure Provenance Schemes
VM Snapshots
Examination and Analysis Stages
Edge Forensics
Forensic Analysis
Effects of Encryption Methods on Cloud Forensic Analysis
Forensic Methods for Handling Tampered Sound Files
Forensic Methods for Handling Image Files
Forensic Methods for Handling Image Files with Steganography
Open Problems
Nature and Scope of Challenges
Encryption and Other Security Issues
Cloud Service Models—Challenges
Design Parameter
Lack of International Collaboration
Paid Service That Requires Protecting Customer Privacy
Findings
Conclusions and Future Scope
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call