The Analysis of Data Tampering and Forensics in a Cloud Environment

Main Article Content

Vibha Upadhya, A.A. Bhusari, Zaid Ibrahim Shaikh, Arshia AH Tamboli

Abstract

In cloud systems, where sensitive data is stored and processed remotely, data manipulation is a serious security problem. The issues of data tampering in cloud environments are explored in this research, along with the importance of forensic investigation in reducing its effects. We explore several data tampering techniques and illustrate the need for strong security measures to guard against unlawful behavior. This paper also covers forensic analysis methods, tools, and techniques that are crucial in locating, analyzing, and minimizing data tampering instances in cloud systems. The security posture associated with cloud infrastructures can be greatly improved by integrating cutting-edge forensic procedures, ensuring data integrity, confidentiality, and overall system dependability.

Article Details

How to Cite
Vibha Upadhya, et al. (2023). The Analysis of Data Tampering and Forensics in a Cloud Environment. International Journal on Recent and Innovation Trends in Computing and Communication, 11(10), 99–103. https://doi.org/10.17762/ijritcc.v11i10.8470
Section
Articles
Author Biography

Vibha Upadhya, A.A. Bhusari, Zaid Ibrahim Shaikh, Arshia AH Tamboli

Vibha Upadhya1, Dr. A.A. Bhusari2, Zaid Ibrahim Shaikh3, Arshia AH Tamboli4

1Department of MCA

Trinity Academy of Engineering

Pune, India.

vibhaupadhyay0610@gmail.com

2Department of MCA

Trinity Academy of Engineering

Pune, India.

aabhusari@gmail.com

3Department of MCA

Trinity Academy of Engineering

Pune, India.

zaid.rh29@gmail.com

4Department of MCA

Trinity Academy of Engineering

Pune, India.

arshiatamboli@gmail.com

References

Tim Mather, Subra Kumaraswamy, and Shahed Latif "Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance"

John R. Vacca "Computer and Information Security Handbook"

Mell, P., & Grance, T. (2011). "The NIST Definition of Cloud Computing." National Institute of Standards and Technology (NIST) Special Publication, 800-145.

Kandukuri, B. R., & Rakshit, A. (2009). "Cloud Security Issues." In Proceedings of the 2009 IEEE International Conference on Services Computing.

NIST. (2012). "Guide to Security for Full Virtualization Technologies." National Institute of Standards and Technology (NIST) Special Publication, 800-125

Stallings, W. (2017). "Cryptography and Network Security: Principles and Practice." Pearson.

Schneier, B. (1996). "Applied Cryptography: Protocols, Algorithms, and Source Code in C." John Wiley & Sons.

Dierks, T., & Rescorla, E. (2008). "The Transport Layer Security (TLS) Protocol Version 1.2." IETF RFC 5246.