Abstract

In this challenging era of technology where cloud computing has expanded its application wings in almost all areas. From individual end-users, small scale business to large organizations. All of them are now free from the maintenance, updating the software and taking the advantage of low-cost investments just by hiring the services and required applications from the cloud rather than building and maintaining the same. Though these advantages are creating much demand for cloud services with more required features at the same time, a challenge comes on the other side from attacks on client's data in the cloud. It becomes more difficult for the investigator to carry out the investigation during cyber-attacks on the cloud. During the attacks, there is a need for a quick response when certain anti-forensics is carried out to mislead the investigators. They may lead to waste of time, efforts, and spent cost. This paper presents a unique methodology to mitigate anti-forensics in a cloud with the effective usage of the relevant graphs. With the effective usage of graphs by the generation of attack, evidence and anti-forensic graphs helpful for the investigator to understand the cause and to carry out relatively countermeasures right way without being deviated by the anti-forensics.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.