Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2022.22.7.38

Analysis of Cybercrime Investigation Problems in the Cloud Environment  

Khachatryan, Grigor (Infrastructure Engineering Lyve Global LTD)
Publication Information
International Journal of Computer Science & Network Security / v.22, no.7, 2022 , pp. 315-319 More about this Journal
Abstract
Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.
Keywords
Cloud computing; cybercrime; investigation challenges; digital evidence; cloud forensics;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Eivy and J. Weinman, "Be Wary of the Economics of "Serverless" Cloud Computing," IEEE Cloud Computing, vol. 4, no. 2, pp. 6-12, Mar. 2017. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1109/mcc.2017.32   DOI
2 H. S. Lallie et al., "Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic," Computers & Security, vol. 105, p. 102248, Jun. 2021. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1016/j.cose.2021.102248   DOI
3 R. Anderson et al., Measuring the Changing Cost of Cybercrime. 2019 The 18th Annual Workshop on the Economics of Information Security https://doi.org/10.17863/CAM.41598   DOI
4 Knauer, "How contact centres can leave businesses exposed to cybercrime," Network Security, vol. 2019, no. 11, pp. 6-9, Nov. 2019. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1016/s1353-4858(19)30130-8   DOI
5 A. Abbasi, A. Abbasi, S. Shamshirband, A. T. Chronopoulos, V. Persico, and A. Pescape, "Software-Defined Cloud Computing: A Systematic Review on Latest Trends and Developments," IEEE Access, vol. 7, pp. 93294-93314, 2019. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1109/access.2019.2927822   DOI
6 M. Adhikari, T. Amgoth, and S. N. Srirama, "A Survey on Scheduling Strategies for Workflows in Cloud Environment and Emerging Trends," ACM Computing Surveys, vol. 52, no. 4, pp. 1-36, Sep. 2019. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1145/3325097   DOI
7 M. Y. Arafat, B. Mondal, and S. Rani, "Technical Challenges of Cloud Forensics and Suggested Solutions," International Journal of Scientific & Engineering Research, vol. 8, no. 8, pp. 1142-1149, Aug. 2017. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.14299/ijser.2017.08.004   DOI
8 E. E.-D. Hemdan and D. H. Manjaiah, "Digital Forensic Approach for Investigation of Cybercrimes in Private Cloud Environment," in Advances in Intelligent Systems and Computing. Singapore: Springer Singapore, 2018, pp. 25-33. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1007/978-981-10-8639-7_3   DOI
9 K. M. Rajasekharaiah, C. S. Dule, and E. Sudarshan, "Cyber Security Challenges and its Emerging Trends on Latest Technologies," IOP Conference Series: Materials Science and Engineering, vol. 981, p. 022062, Dec. 2020. Accessed: Jun. 17, 2022. [Online]. Available: https://doi.org/10.1088/1757-899x/981/2/022062   DOI
10 J. Kremling and A. M. S. Parker, Cyberspace, Cybersecurity, and Cybercrime. SAGE Publications, Inc, 2017.