info@ijrretas.com
+91 77710 84928 Support
ijrretas LogoIJRRETAS
  • About
    • About The Journal
    • Aim & Scope
    • Privacy Statement
    • Journal Policies
    • Disclaimer
    • Abstracting and Indexing
    • FAQ
  • Current
  • Archive
  • For Author
    • Submit Paper Online
    • Article Processing Charges
    • Submission Guidelines
    • Manuscript Types
    • Download Article Template
    • Download Copyright Form
  • Editorial Board
    • Editorial Board
    • Editors Responsibilities
  • Conference
  • Contact
  • Pay Online
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

A Novel Technique For Forensic Investigation In Cloud Environment

Authors: Ayesha Sharma, Shweta Yadav

Certificate: View Certificate

Abstract

To receiving essential service is the users need, with the superior development of the Internet tools just about the world, attackers as well intend to classify a assortment of loophole in the networks. When we communicate concerning Clouds, the main aim of the attackers is to generate illegitimate and dishonest attack to the accessible resources in the Cloud computing situation. In regulate to conquer these obstruction, a measure of actions require be in utilize the host base and network base level The purpose of this research to analyze the problem of forensics in cloud computing network and devise efficient solutions to allow for efficient investigations of cybercrimes in cloud computing environments. To overcome these limitations, an improved version of KNN is proposed in this research. Our proposed approach improves classification performance Genetic Algorithm (GA) is combined with KNN to. Instead of considering all the training samples and taking kneighbours.

Introduction

Currently Internet is the pivot of our world, and the World Wide Web(WWW) is the key to Access it. To develop interaction on internet networks and trust responsive documents to online services. Desktop application are being return by completely periphery applications that can be way in from any devices. This is probable appreciation to innovative web technologies that are creature introduced at a extremely fast pace. though, these advance approach at a price. Nowadays, the web is the major resources used by cyber-criminals to carry out attacks beside people and organization. In a situation where information is exceptionally dynamic and unpredictable, the fight against cybercrime is appropriate more and added complicated[1]. Many researchers aimed at fueling research against cybercrimes. In this work added focused on a forensic perception and depiction serious limitations of present investigation technique when dealing with contemporary digital information. In meticulous, it illustrate how it is probable to leverage ordinary Internet services in regulate to forge digital evidence, which can be oppressed by a cyber-criminal to maintain an clarification. Proposed, a narrative technique to track cyber-criminal behavior on the Internet is proposed, expected at the gaining and analysis of information from extremely dynamic services such as online communication. The subsequent fraction is added concerned in relation to the investigation of criminal behavior on the network. Intend at raising consciousness for imminent threats, narrative technique for the purpose of network - base attacks are accessible. These attacks influence the similar cutting edge expertise used these days to construct pleasant and fully-featured application. Lastly, a complete study of nowadays top menace on the web, namely develop kits, is presented.

Conclusion

Security illustrate up as a most important concern in cloud computing. In fact, numerous threats may concession the service or the convention among users and provider. Regardless of the utilize of traditional security defense method, cybercrimes on cloud computing communications might forever happen. To understand forensics technique to assist explores cybercrime when they do occur. raise such as how to accumulate data, where and how to store metadata for every transaction, how to evaluate log files, how to classify attacks on cloud infrastructure. In this research to evaluate the problem of forensics in cloud computing and devise efficient explanation to permit for efficient investigation of cybercrimes in cloud compute environment. To overcome these limitations, an improved version of KNN is proposed in this research. Our proposed approach improve classification performance Genetic Algorithm (GA) is combined with KNN to. Instead of considering all the training samples and taking k-neighbors.

Copyright

Copyright © 2025 Ayesha Sharma, Shweta Yadav. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Download Paper

Paper Id: IJRRETAS38

Publish Date: 2016-08-01

ISSN: 2455-4723

Publisher Name: ijrretas

About ijrretas

ijrretas is a leading open-access, peer-reviewed journal dedicated to advancing research in applied sciences and engineering. We provide a global platform for researchers to disseminate innovative findings and technological breakthroughs.

ISSN
2455-4723
Established
2015

Quick Links

Home Submit Paper Author Guidelines Editorial Board Past Issues Topics
Fees Structure Scope & Topics Terms & Conditions Privacy Policy Refund and Cancellation Policy

Contact Us

Vidhya Innovative Technology 514, Pukhraj Corporate Navlakha, Indore (M.P) - India

info@ijrretas.com

+91 77710 84928

www.ijrretas.com

Indexed In
Google Scholar Crossref DOAJ ResearchGate CiteFactor
© 2026 ijrretas. All Rights Reserved.
Privacy Policy Terms of Service