Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and processing can be introduced to trace malicio...

Full description

Bibliographic Details
Main Authors: Oludare Isaac Abiodun, Moatsum Alawida, Abiodun Esther Omolara, Abdulatif Alabdulatif
Format: Article
Language:English
Published: Elsevier 2022-11-01
Series:Journal of King Saud University: Computer and Information Sciences
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S131915782200369X
_version_ 1811184018413060096
author Oludare Isaac Abiodun
Moatsum Alawida
Abiodun Esther Omolara
Abdulatif Alabdulatif
author_facet Oludare Isaac Abiodun
Moatsum Alawida
Abiodun Esther Omolara
Abdulatif Alabdulatif
author_sort Oludare Isaac Abiodun
collection DOAJ
description It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and processing can be introduced to trace malicious vulnerabilities. Thus, data provenance process makes it easy to monitor the sources and causes of any problems in cloud computing. However, data provenance is one of the most prominent drawbacks in cloud storage. Despite many studies, a full assessment of data provenance in cloud forensics is still missing from the literature, especially in wireless sensor networks, blockchain, Internet of Things (IoT), security and privacy. Importantly, one of the major challenges in data provenance is “how to reduce the complexity of evidence.“ That is, ensuring volatile data is captured before being overwritten. Hence, this study presents a survey of recent data provenance problems in cloud computing, provenance taxonomy, and security issues. It also, discusses how volatile data can be captured before being overwritten and then helps identify current provenance limitations and future directions for further study. More also, it examined how data is collected as evidence for digital crime in a real-world scenario. Furthermore, future work in digital provenance for cloud forensics, wireless sensor network, IoT, and blockchain is recommended.
first_indexed 2024-04-11T13:06:18Z
format Article
id doaj.art-95f9a5ab327a47bcab1c52bf5c80ce79
institution Directory Open Access Journal
issn 1319-1578
language English
last_indexed 2024-04-11T13:06:18Z
publishDate 2022-11-01
publisher Elsevier
record_format Article
series Journal of King Saud University: Computer and Information Sciences
spelling doaj.art-95f9a5ab327a47bcab1c52bf5c80ce792022-12-22T04:22:45ZengElsevierJournal of King Saud University: Computer and Information Sciences1319-15782022-11-0134101021710245Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A surveyOludare Isaac Abiodun0Moatsum Alawida1Abiodun Esther Omolara2Abdulatif Alabdulatif3Department of Computer Science, University of Abuja, Gwagwalada, Nigeria; Corresponding authors.Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates; Corresponding authors.Department of Computer Science, University of Abuja, Gwagwalada, NigeriaDepartment of Computer Science, College of Computer, Qassim University, Buraydah 52571, Saudi ArabiaIt is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and processing can be introduced to trace malicious vulnerabilities. Thus, data provenance process makes it easy to monitor the sources and causes of any problems in cloud computing. However, data provenance is one of the most prominent drawbacks in cloud storage. Despite many studies, a full assessment of data provenance in cloud forensics is still missing from the literature, especially in wireless sensor networks, blockchain, Internet of Things (IoT), security and privacy. Importantly, one of the major challenges in data provenance is “how to reduce the complexity of evidence.“ That is, ensuring volatile data is captured before being overwritten. Hence, this study presents a survey of recent data provenance problems in cloud computing, provenance taxonomy, and security issues. It also, discusses how volatile data can be captured before being overwritten and then helps identify current provenance limitations and future directions for further study. More also, it examined how data is collected as evidence for digital crime in a real-world scenario. Furthermore, future work in digital provenance for cloud forensics, wireless sensor network, IoT, and blockchain is recommended.http://www.sciencedirect.com/science/article/pii/S131915782200369XCybersecurityCloud computingData provenance and challengesSolutionsSecurityDigital forensic
spellingShingle Oludare Isaac Abiodun
Moatsum Alawida
Abiodun Esther Omolara
Abdulatif Alabdulatif
Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
Journal of King Saud University: Computer and Information Sciences
Cybersecurity
Cloud computing
Data provenance and challenges
Solutions
Security
Digital forensic
title Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
title_full Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
title_fullStr Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
title_full_unstemmed Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
title_short Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
title_sort data provenance for cloud forensic investigations security challenges solutions and future perspectives a survey
topic Cybersecurity
Cloud computing
Data provenance and challenges
Solutions
Security
Digital forensic
url http://www.sciencedirect.com/science/article/pii/S131915782200369X
work_keys_str_mv AT oludareisaacabiodun dataprovenanceforcloudforensicinvestigationssecuritychallengessolutionsandfutureperspectivesasurvey
AT moatsumalawida dataprovenanceforcloudforensicinvestigationssecuritychallengessolutionsandfutureperspectivesasurvey
AT abiodunestheromolara dataprovenanceforcloudforensicinvestigationssecuritychallengessolutionsandfutureperspectivesasurvey
AT abdulatifalabdulatif dataprovenanceforcloudforensicinvestigationssecuritychallengessolutionsandfutureperspectivesasurvey