Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and processing can be introduced to trace malicio...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2022-11-01
|
Series: | Journal of King Saud University: Computer and Information Sciences |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S131915782200369X |
_version_ | 1811184018413060096 |
---|---|
author | Oludare Isaac Abiodun Moatsum Alawida Abiodun Esther Omolara Abdulatif Alabdulatif |
author_facet | Oludare Isaac Abiodun Moatsum Alawida Abiodun Esther Omolara Abdulatif Alabdulatif |
author_sort | Oludare Isaac Abiodun |
collection | DOAJ |
description | It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and processing can be introduced to trace malicious vulnerabilities. Thus, data provenance process makes it easy to monitor the sources and causes of any problems in cloud computing. However, data provenance is one of the most prominent drawbacks in cloud storage. Despite many studies, a full assessment of data provenance in cloud forensics is still missing from the literature, especially in wireless sensor networks, blockchain, Internet of Things (IoT), security and privacy. Importantly, one of the major challenges in data provenance is “how to reduce the complexity of evidence.“ That is, ensuring volatile data is captured before being overwritten. Hence, this study presents a survey of recent data provenance problems in cloud computing, provenance taxonomy, and security issues. It also, discusses how volatile data can be captured before being overwritten and then helps identify current provenance limitations and future directions for further study. More also, it examined how data is collected as evidence for digital crime in a real-world scenario. Furthermore, future work in digital provenance for cloud forensics, wireless sensor network, IoT, and blockchain is recommended. |
first_indexed | 2024-04-11T13:06:18Z |
format | Article |
id | doaj.art-95f9a5ab327a47bcab1c52bf5c80ce79 |
institution | Directory Open Access Journal |
issn | 1319-1578 |
language | English |
last_indexed | 2024-04-11T13:06:18Z |
publishDate | 2022-11-01 |
publisher | Elsevier |
record_format | Article |
series | Journal of King Saud University: Computer and Information Sciences |
spelling | doaj.art-95f9a5ab327a47bcab1c52bf5c80ce792022-12-22T04:22:45ZengElsevierJournal of King Saud University: Computer and Information Sciences1319-15782022-11-0134101021710245Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A surveyOludare Isaac Abiodun0Moatsum Alawida1Abiodun Esther Omolara2Abdulatif Alabdulatif3Department of Computer Science, University of Abuja, Gwagwalada, Nigeria; Corresponding authors.Department of Computer Sciences, Abu Dhabi University, Abu Dhabi 59911, United Arab Emirates; Corresponding authors.Department of Computer Science, University of Abuja, Gwagwalada, NigeriaDepartment of Computer Science, College of Computer, Qassim University, Buraydah 52571, Saudi ArabiaIt is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and processing can be introduced to trace malicious vulnerabilities. Thus, data provenance process makes it easy to monitor the sources and causes of any problems in cloud computing. However, data provenance is one of the most prominent drawbacks in cloud storage. Despite many studies, a full assessment of data provenance in cloud forensics is still missing from the literature, especially in wireless sensor networks, blockchain, Internet of Things (IoT), security and privacy. Importantly, one of the major challenges in data provenance is “how to reduce the complexity of evidence.“ That is, ensuring volatile data is captured before being overwritten. Hence, this study presents a survey of recent data provenance problems in cloud computing, provenance taxonomy, and security issues. It also, discusses how volatile data can be captured before being overwritten and then helps identify current provenance limitations and future directions for further study. More also, it examined how data is collected as evidence for digital crime in a real-world scenario. Furthermore, future work in digital provenance for cloud forensics, wireless sensor network, IoT, and blockchain is recommended.http://www.sciencedirect.com/science/article/pii/S131915782200369XCybersecurityCloud computingData provenance and challengesSolutionsSecurityDigital forensic |
spellingShingle | Oludare Isaac Abiodun Moatsum Alawida Abiodun Esther Omolara Abdulatif Alabdulatif Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey Journal of King Saud University: Computer and Information Sciences Cybersecurity Cloud computing Data provenance and challenges Solutions Security Digital forensic |
title | Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey |
title_full | Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey |
title_fullStr | Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey |
title_full_unstemmed | Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey |
title_short | Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey |
title_sort | data provenance for cloud forensic investigations security challenges solutions and future perspectives a survey |
topic | Cybersecurity Cloud computing Data provenance and challenges Solutions Security Digital forensic |
url | http://www.sciencedirect.com/science/article/pii/S131915782200369X |
work_keys_str_mv | AT oludareisaacabiodun dataprovenanceforcloudforensicinvestigationssecuritychallengessolutionsandfutureperspectivesasurvey AT moatsumalawida dataprovenanceforcloudforensicinvestigationssecuritychallengessolutionsandfutureperspectivesasurvey AT abiodunestheromolara dataprovenanceforcloudforensicinvestigationssecuritychallengessolutionsandfutureperspectivesasurvey AT abdulatifalabdulatif dataprovenanceforcloudforensicinvestigationssecuritychallengessolutionsandfutureperspectivesasurvey |