The Analysis of Data Tampering and Forensics in a Cloud Environment
Main Article Content
Abstract
In cloud systems, where sensitive data is stored and processed remotely, data manipulation is a serious security problem. The issues of data tampering in cloud environments are explored in this research, along with the importance of forensic investigation in reducing its effects. We explore several data tampering techniques and illustrate the need for strong security measures to guard against unlawful behavior. This paper also covers forensic analysis methods, tools, and techniques that are crucial in locating, analyzing, and minimizing data tampering instances in cloud systems. The security posture associated with cloud infrastructures can be greatly improved by integrating cutting-edge forensic procedures, ensuring data integrity, confidentiality, and overall system dependability.
Article Details
References
Tim Mather, Subra Kumaraswamy, and Shahed Latif "Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance"
John R. Vacca "Computer and Information Security Handbook"
Mell, P., & Grance, T. (2011). "The NIST Definition of Cloud Computing." National Institute of Standards and Technology (NIST) Special Publication, 800-145.
Kandukuri, B. R., & Rakshit, A. (2009). "Cloud Security Issues." In Proceedings of the 2009 IEEE International Conference on Services Computing.
NIST. (2012). "Guide to Security for Full Virtualization Technologies." National Institute of Standards and Technology (NIST) Special Publication, 800-125
Stallings, W. (2017). "Cryptography and Network Security: Principles and Practice." Pearson.
Schneier, B. (1996). "Applied Cryptography: Protocols, Algorithms, and Source Code in C." John Wiley & Sons.
Dierks, T., & Rescorla, E. (2008). "The Transport Layer Security (TLS) Protocol Version 1.2." IETF RFC 5246.