info@ijrretas.com
+91 77710 84928 Support
ijrretas LogoIJRRETAS
  • About
    • About The Journal
    • Aim & Scope
    • Privacy Statement
    • Journal Policies
    • Disclaimer
    • Abstracting and Indexing
    • FAQ
  • Current
  • Archive
  • For Author
    • Submit Paper Online
    • Article Processing Charges
    • Submission Guidelines
    • Manuscript Types
    • Download Article Template
    • Download Copyright Form
  • Editorial Board
    • Editorial Board
    • Editors Responsibilities
  • Conference
  • Contact
  • Pay Online
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Design and implementation for Secure Data using investigation in Cloud Environment

Authors: Ayesha Sharma, Shweta Yadav

Certificate: View Certificate

Abstract

Security illustrate up as a most important concern in cloud computing. In fact, numerous threats may concession the service or the convention among users and provider. Regardless of the utilize of traditional security defense method, cybercrimes on cloud computing communications might forever happen. To understand forensics technique to assist explores cybercrime when they do occur. raise such as how to accumulate data, where and how to store metadata for every transaction, how to evaluate log files, how to classify attacks on cloud infrastructure. In this research to evaluate the problem of forensics in cloud computing and devise efficient explanation to permit for efficient investigation of cybercrimes in cloud compute environment. To overcome these limitations, an improved version of KNN is proposed in this research. Our proposed approach improve classification performance Genetic Algorithm (GA) is combined with KNN to. Instead of considering all the training samples and taking k-neighbors. According to the obtained performance outcomes the system works accurately and efficiently as compared to traditional system but the performance is not much acceptable due to high time complexity.

Introduction

The introduction of this work is to stimulate research next to novel generation crimes. The foremost part is added focused on a forensic pointof-view, and address a quantity of issue connected to the growth of digital evidence. In exacting, it explain how the detonation of the network announcement replica has very misused our association with technology and, as outcome, our behavioral patterns. In meticulous, to interpretation the limitations of existing investigation technique when dealing with contemporary digital substantiation like online documents, data sending and getting and so on. Hereinafter, we illustrate how it is probable to leverage widespread Internet services in arrange to forge digital evidence, which can be oppressed by a cyber-criminal, in the situation of a testing, in regulate to claim a digital explanation. Furthermore, a narrative technique to analyze cyber-criminal behavior on the Internet is proposed. This technique permit acquire information from extremely dynamic resources, such as online social networks and clouding storage services, while conserve reliability, strength and unpredictability of the composed data. Digital forensics is the set of regulation regarding the recuperation and investigation of digital material. Depending on the kind of media concerned in the investigation, digital forensics can be alienated in a variety of sub-branches database forensics, computer forensics, network forensics, and mobile forensics. In adding to the classification of direct evidence of a crime, digital information can be as well used to attribute evidence to precise suspects, corroborate or invalidate alibi or statements, establish intent, recognize sources or authenticate documents. The characteristic forensic procedure consists of three phases: ? Forensic imaging (gaining) of the digital media ? study (investigation) of the obtain data ? construction of a report concerning the composed evidence conventionally, the acquisition worry the conception of an exact sector-level of the inquire media. This assignment should be proficient by means of write-bloc

Conclusion

To overcome these limitations, an improved version of KNN is proposed in this research. Our proposed approach improve classification performance Genetic Algorithm (GA) is combined with KNN to. Instead of considering all the training samples and taking k-neighbors. According to the obtained performance outcomes the system works accurately and efficiently as compared to traditional system but the performance is not much acceptable due to high time complexity.

Copyright

Copyright © 2025 Ayesha Sharma, Shweta Yadav. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Download Paper

Paper Id: IJRRETAS37

Publish Date: 2016-07-01

ISSN: 2455-4723

Publisher Name: ijrretas

About ijrretas

ijrretas is a leading open-access, peer-reviewed journal dedicated to advancing research in applied sciences and engineering. We provide a global platform for researchers to disseminate innovative findings and technological breakthroughs.

ISSN
2455-4723
Established
2015

Quick Links

Home Submit Paper Author Guidelines Editorial Board Past Issues Topics
Fees Structure Scope & Topics Terms & Conditions Privacy Policy Refund and Cancellation Policy

Contact Us

Vidhya Innovative Technology 514, Pukhraj Corporate Navlakha, Indore (M.P) - India

info@ijrretas.com

+91 77710 84928

www.ijrretas.com

Indexed In
Google Scholar Crossref DOAJ ResearchGate CiteFactor
© 2026 ijrretas. All Rights Reserved.
Privacy Policy Terms of Service