Forensic challenges in mobile cloud computing

Suleman Khan, Ejaz Ahmad, Muhammad Shiraz, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

21 Citations (Scopus)

Abstract

Mobile cloud computing (MCC) is fast becoming one of the most essential research topics for distributed resource networks. Users can easily access cloud while offloading their mobile applications from anywhere anytime. Being easy to access, intruder attacks mobile networks to acquire credential from mobile applications inside and outside the cloud computing. To investigate intruder's attacks, digital investigator has to identify the root cause of the attack. However, investigating MCC infrastructure is difficult due to its characteristics of virtualization, dispersion of data, multi tenancy, interoperability, and mobility. In this paper, we present an overview of MCC and digital forensics, focusing on its key aspects and significant forensic challenges faced by digital investigators in MCC. The purpose of this paper is to provide a comprehensive understanding about forensic research challenges and re-direct researchers towards new research areas.
Original languageEnglish
Title of host publication2014 I4CT
Subtitle of host publication1st International Conference on Computer, Communications, and Control Technology
EditorsHamzah Asyrani Bin Sulaiman
Pages343-347
Number of pages5
DOIs
Publication statusPublished - 2 Sept 2014
Externally publishedYes
Event1ST INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, AND CONTROL TECHNOLOGY - favehotel, Langkawi, Malaysia
Duration: 2 Sept 20144 Sept 2014
https://ieeexplore.ieee.org/xpl/conhome/6902668/proceeding

Conference

Conference1ST INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, AND CONTROL TECHNOLOGY
Abbreviated title2014 I4CT
Country/TerritoryMalaysia
CityLangkawi
Period2/09/144/09/14
Internet address

Fingerprint

Dive into the research topics of 'Forensic challenges in mobile cloud computing'. Together they form a unique fingerprint.

Cite this