Design and Implementation of Attack Detection Technique using Forensic Investigators in Cloud Environment
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 8 Issue 1, January 2019

Design and Implementation of Attack Detection Technique using Forensic Investigators in Cloud Environment

Sonali Ogra, Prof. Praneet Khare, Prof. Anurag Shrivastava

Design and implementation of attack detection technique using forensic investigators in cloud environment

Keywords: Cloud Computing, Cloud forensics, Digital Forensics, Cloud Forensics model

Edition: Volume 8 Issue 1, January 2019

Pages: 241 - 244

Share this Article

How to Cite this Article?

Sonali Ogra, Prof. Praneet Khare, Prof. Anurag Shrivastava, "Design and Implementation of Attack Detection Technique using Forensic Investigators in Cloud Environment", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20194034, Volume 8 Issue 1, January 2019, 241 - 244

167 PDF Views | 107 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Cloud Computing'

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1028 - 1031

Secure and Efficient Item Information Retrieval in Cloud Computing

Dr. Shameem Akther, Tahseen Begum

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this Article

Masters Thesis, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 130 - 134

Implementation of Client-Side Deduplication on Encrypted Data with Public Auditing in Cloud Storage

Lekhashree N R, Shashidhara M S, Santhosh S

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2369 - 2372

Multi-Level Complex Key Sharing For Secure Access and Authorization on Cloud Platforms

Jaskarandeep Punia, Rajesh Kumar Bawa

Share this Article

Similar Articles with Keyword 'Digital Forensics'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2452 - 2455

A Review on Big Data Management and NoSQL Databases in Digital Forensics

Nikhil Mangle, Prof. Praful B. Sambhare

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 205 - 208

Recovering Deleted Files from NTFS

Rincy Roy Oommen, Princy Sugathan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1544 - 1551

Security Measures in SCADA Systems

Steffi Paul Kalib, Manoj K. Rawat

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1404 - 1408

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

Dhara Anandpara, Rohit Srivastava

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2024 - 2027

A Survey on Corrupted Video Recovery Using CODEC Specifications

Avinash Deshmukh, Manisha Desai

Share this Article
Top