DOI QR코드

DOI QR Code

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • 투고 : 2022.07.05
  • 발행 : 2022.07.30

초록

Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

키워드

참고문헌

  1. R. Anderson et al., Measuring the Changing Cost of Cybercrime. 2019 The 18th Annual Workshop on the Economics of Information Security https://doi.org/10.17863/CAM.41598
  2. A. Abbasi, A. Abbasi, S. Shamshirband, A. T. Chronopoulos, V. Persico, and A. Pescape, "Software-Defined Cloud Computing: A Systematic Review on Latest Trends and Developments," IEEE Access, vol. 7, pp. 93294-93314, 2019. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1109/access.2019.2927822
  3. M. Adhikari, T. Amgoth, and S. N. Srirama, "A Survey on Scheduling Strategies for Workflows in Cloud Environment and Emerging Trends," ACM Computing Surveys, vol. 52, no. 4, pp. 1-36, Sep. 2019. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1145/3325097
  4. M. Y. Arafat, B. Mondal, and S. Rani, "Technical Challenges of Cloud Forensics and Suggested Solutions," International Journal of Scientific & Engineering Research, vol. 8, no. 8, pp. 1142-1149, Aug. 2017. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.14299/ijser.2017.08.004
  5. Eivy and J. Weinman, "Be Wary of the Economics of "Serverless" Cloud Computing," IEEE Cloud Computing, vol. 4, no. 2, pp. 6-12, Mar. 2017. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1109/mcc.2017.32
  6. Knauer, "How contact centres can leave businesses exposed to cybercrime," Network Security, vol. 2019, no. 11, pp. 6-9, Nov. 2019. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1016/s1353-4858(19)30130-8
  7. E. E.-D. Hemdan and D. H. Manjaiah, "Digital Forensic Approach for Investigation of Cybercrimes in Private Cloud Environment," in Advances in Intelligent Systems and Computing. Singapore: Springer Singapore, 2018, pp. 25-33. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1007/978-981-10-8639-7_3
  8. J. Kremling and A. M. S. Parker, Cyberspace, Cybersecurity, and Cybercrime. SAGE Publications, Inc, 2017.
  9. H. S. Lallie et al., "Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic," Computers & Security, vol. 105, p. 102248, Jun. 2021. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1016/j.cose.2021.102248
  10. K. M. Rajasekharaiah, C. S. Dule, and E. Sudarshan, "Cyber Security Challenges and its Emerging Trends on Latest Technologies," IOP Conference Series: Materials Science and Engineering, vol. 981, p. 022062, Dec. 2020. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1088/1757-899x/981/2/022062