Tuesday, May 5, 2020

Design and Analysis of Algorithms-Free-Samples-Myassignmenthelp.com

Question: Discuss about the Design and Analysis of Algorithms. Answer: Introduction: This report helps in summarizing the paper on Digital Forensics in the Cloud by Shams Zawoad and Ragib Hasan. This report mainly discusses about the key aspects that this article discusses that is the supporting of the computer forensic investigations by the cloud computing lacks behind and the existing digital forensic tools are not able to cope up with the nature of the cloud which is dynamic. The report also discusses about the linking of the work done by them on their previous research paper. The report also shows the ultimate conclusion of this research paper along with the evidences for supporting them. Discussion: Questions the paper addresses: This paper mainly discusses about the technical challenges faced during the execution of the digital forensics in a cloud environment. The paper also discusses about the key requirements that are needed for the purpose of making the clouds friendly for the forensics. This portion of the paper mainly discusses about the various cloud computing factors that are making this process complicated (Zawoad Hasan, 2012). Few of which included in this components are the law agents are unable to confiscate the computer of the suspect or get access to the digital evidences due to the fact that the storage systems are not local. Another component is the separation of the particular suspects data from the users data is very difficult and there are also many other reasons which makes the process of digital forensics complicated. Linking of the authors work with the previous researches: Cloud forensics mainly refers to the process of application of all the different processes of the digital forensics into the cloud environment. According to Ruan et al. (2011), the dependency of cloud computing on the extensive network access will greatly help the cloud forensics to conduct their investigation processes on the private as well as the public networks. There are also various things which are included in the cloud forensics and this includes the investigation of the various systems, processes, cash and also the history of the registration. Main conclusion: The main conclusion of the paper includes the collection of the trustworthy evidences from the cloud which is very much challenging due to the fact that there is little control over the clouds than the tradition ways. The conclusion also states that the investigators have to depend on the CSP for the purpose of collecting the evidences from the cloud. And to make the situation become more worse a there remains no way of verifying weather the evidences collected from the CSP is correct or not. So there is a need of building a trustworthy model for the purpose of collecting a trustworthy evidence. And the is also a need for the CSP to come forward so as to solve most of the issues (Zawoad Hasan, 2012). The paper finally concludes with the fact that there is a need of creating a secure model for the forensics which will initially lead to making the clouds more trustworthy and will allow the adaptation of various sensitive application domains. Evidences for supporting the conclusion: Due to the fact that the cloud computing doesnt provide any facility for the forensic investigations so these cannot be used for the purpose of storing the informations of healthcare, business or any type of information related to national security that requires an audit or regulatory compliance. Auditability being vital issue for the purpose of making the clouds complaint to the regulatory act. Business organizations are not able to move their financial data to the clouds as they are not complying with the SOX act (Hostak et al., 2013), and along with this the cloud infrastructure also doesnt comply with the HIPAAs forensic investigation requirements so the hospitals are not able to move their private data in the cloud. So there is a need of the forensic enabled cloud architecture for supporting and satisfying the requirements and also to increase the auditability of the cloud environment. And by deployment of the new architecture will surely help in the storing and providing the ty pes of evidences required by the cloud forensics. Justification of the Data supporting the Evidences of the conclusion: The evidences which support the need of the new architecture are The Sarbanes Oxley act or SOX and the Health Insurance Portability and Accountability Act. This acts helps in better understanding of the needs as the SOX act states that the Financial information must be residing the auditable storage which the CSPs are not able to provide at this time so the business cannot move their financial data to the clouds as they are not able to comply with the SOX act and the cloud infrastructure also doesnt comply with the HIPAAs forensic investigation requirements thereby preventing the hospitals from storing the confidential data of the patients and the medical data as well in the cloud (Luxton, Kayl Mishkind, 2012). And this evidences actually provides a great support for the creation of the new model for the purpose of solving tis problems and talking of the quality this evidences are of high quality as any vital information which cannot be investigated by the digital forensics will cre ate a lot of problem. Questions that remains unanswered: The questions that are not answered in this paper is the architecture of the new model which is needed for the leading the trustworthy clouds. Another question which remains unanswered is the way how a regulatory complain cloud can save the investments. The way of solving the audit compliance issue is not provided in this paper. Quality of the paper: The materials and the method provide in this paper can greatly help in conducting the experiments as all this are provided in a very detailed form. The methods are very easy to follow and the steps provided in this paper are very much easy. Authors and their previous experiences: This paper is published by two authors namely Sahms Zawoad (working as a graduate research assistant in SECuRE and trustworthy Computing Lab or SECRETLab) and Ragib Hasan (a tenure-track Assistant Professor at the Department of Computer and Information Science at the University of Alabama at Birmingham. Sahms Zawoad had an interest in the cloud security especially on the cloud forensics and in location provenance. Before joining of his Ph.D. degree he has worked in the software industry where he was associated with developing a authentication and authorization framework for the several applications required for the business which also includes one online payment system for the post office of Bangladesh. Whereas, the key focus of Ragib Hasan was on the security problems of a practical computer. He has also done research on the cloud security, mobile malware security, secure provenance and security of the database. He also founded the SECuRE and trustworthy Computing Lab (Zawoad Hasan , 2012). Conclusion: The summary of the paper Digital Forensics in the Cloud by Shams Zawoad and Ragib Hasan helps to conclude that there is an essential need for the development of a new model for the digital forensic which will help the investigators a lot and for demonstrating the need for the new model various examples has been used for the better understanding. The methods and the materials provided in the paper is also very helpful which will help the investigators a lot for their future investigations. References: Hostak, P., Lys, T., Yang, Y.G. and Carr, E., 2013. An examination of the impact of the SarbanesOxley Act on the attractiveness of US capital markets for foreign firms.Review of Accounting Studies,18(2), pp.522-559. Luxton, D. D., Kayl, R. A., Mishkind, M. C. (2012). mHealth data security: The need for HIPAA-compliant standardization.Telemedicine and e-Health,18(4), 284-288. Zawoad, S., Hasan, R. (2012). Towards building proofs of past data possession in cloud forensics.ASE Science Journal,1(4), 195-207.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.