Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing

As information technology advances, associated risks also increase, particularly in the field of private cloud computing services. These services are subject to potential internal abuse risks, either due to system vulnerabilities or other factors. However, the investigation of these incidents in pri...

Full description

Bibliographic Details
Main Authors: Reza Febriana, Ahmad Luthfi
Format: Article
Language:English
Published: Ikatan Ahli Informatika Indonesia 2023-10-01
Series:Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
Subjects:
Online Access:http://jurnal.iaii.or.id/index.php/RESTI/article/view/5279
_version_ 1797327613301096448
author Reza Febriana
Ahmad Luthfi
author_facet Reza Febriana
Ahmad Luthfi
author_sort Reza Febriana
collection DOAJ
description As information technology advances, associated risks also increase, particularly in the field of private cloud computing services. These services are subject to potential internal abuse risks, either due to system vulnerabilities or other factors. However, the investigation of these incidents in private cloud computing varies greatly due to the different frameworks and unique characteristics of each cloud service. The lack of a standardized approach to analyzing and assessing investigative processes in cloud computing services has been a persistent problem. This lack of consensus affects the accuracy, efficiency, and data acquisition process when dealing with digital evidence in each method, causing concern among researchers. To overcome this, a comparative study was carried out with a focus on the ADAM (The Advanced Data Acquisition Model) method and the NIST (National Institute of Standards and Technology) method. The goal is to identify the most effective investigative process to deal with cyber attack incidents on both the server and client side of cloud computing services. By testing these methods in a network that is built on private cloud computing services, then the results from this research include the weaknesses and strengths of the ADAM and NIST methods are found when applied to cloud computing case studies and these have not been identified in previous research, then produce recommendations for investigators when conducting investigations on case studies on cloud computing, and in this study managed to find a bug in the ownCloud application version 10.9.1. Then this study also aims to provide researchers with valuable references to carry out analysis and assessment in the investigative process, where standardization is still an unresolved issue.
first_indexed 2024-03-08T06:41:04Z
format Article
id doaj.art-4586aaf43d034eb1844df6f605e0ba0e
institution Directory Open Access Journal
issn 2580-0760
language English
last_indexed 2024-03-08T06:41:04Z
publishDate 2023-10-01
publisher Ikatan Ahli Informatika Indonesia
record_format Article
series Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
spelling doaj.art-4586aaf43d034eb1844df6f605e0ba0e2024-02-03T08:44:16ZengIkatan Ahli Informatika IndonesiaJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)2580-07602023-10-01751097111010.29207/resti.v7i5.52795279Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud ComputingReza Febriana0Ahmad Luthfi1Indonesian Islamic UniversityIndonesian Islamic UniversityAs information technology advances, associated risks also increase, particularly in the field of private cloud computing services. These services are subject to potential internal abuse risks, either due to system vulnerabilities or other factors. However, the investigation of these incidents in private cloud computing varies greatly due to the different frameworks and unique characteristics of each cloud service. The lack of a standardized approach to analyzing and assessing investigative processes in cloud computing services has been a persistent problem. This lack of consensus affects the accuracy, efficiency, and data acquisition process when dealing with digital evidence in each method, causing concern among researchers. To overcome this, a comparative study was carried out with a focus on the ADAM (The Advanced Data Acquisition Model) method and the NIST (National Institute of Standards and Technology) method. The goal is to identify the most effective investigative process to deal with cyber attack incidents on both the server and client side of cloud computing services. By testing these methods in a network that is built on private cloud computing services, then the results from this research include the weaknesses and strengths of the ADAM and NIST methods are found when applied to cloud computing case studies and these have not been identified in previous research, then produce recommendations for investigators when conducting investigations on case studies on cloud computing, and in this study managed to find a bug in the ownCloud application version 10.9.1. Then this study also aims to provide researchers with valuable references to carry out analysis and assessment in the investigative process, where standardization is still an unresolved issue.http://jurnal.iaii.or.id/index.php/RESTI/article/view/5279frameworkadamnistcloudcomparison
spellingShingle Reza Febriana
Ahmad Luthfi
Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
framework
adam
nist
cloud
comparison
title Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing
title_full Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing
title_fullStr Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing
title_full_unstemmed Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing
title_short Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing
title_sort comparative study of cloud forensic investigation using adam and nist 800 86 methods in private cloud computing
topic framework
adam
nist
cloud
comparison
url http://jurnal.iaii.or.id/index.php/RESTI/article/view/5279
work_keys_str_mv AT rezafebriana comparativestudyofcloudforensicinvestigationusingadamandnist80086methodsinprivatecloudcomputing
AT ahmadluthfi comparativestudyofcloudforensicinvestigationusingadamandnist80086methodsinprivatecloudcomputing