A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Design of Security Technique through Secure Logging for Cloud Forensics
2019
International Journal of Engineering and Advanced Technology
Cloud computing has a new edge computing paradigm these days. Sometimes cloud computing architectures don't support for computer forensics investigations. Analyzing various types of logs and logging mechanism plays an important role in computer forensics. Distributed nature and the multi-tenant cloud models, where many users share the same processing and network resources, collecting, storing and analyzing logs from a cloud is very hard. User activity logs can be a valuable source of
doi:10.35940/ijeat.f9312.088619
fatcat:hlvwvd6hyjhtjfzlvh7qv7rydi