Unique Methodology to Mitigate Anti-Forensics in Cloud using Attack- Graphs
Shaik Khaja Mohiddin1, Y Suresh Babu2
1Shaik Khaja Mohiddin, Research Scholar, Dept. of CSE, Acharya Nagarjuna University, Guntur, Andhra Pradesh,India.
2Dr. Y Suresh Babu, Associate Professor, Asso.Prof., Dept. Of CSE. VVIT, Dept. Of CSE, JKC College, Chennai, Guntur, Andhra Pradesh,India
Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 1569-1574| Volume-8 Issue-10, August 2019 | Retrieval Number:  10.35940/ijitee.A1037.0881019 | DOI: 10.35940/ijitee.A1037.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract:  In this challenging era of technology where cloud computing has expanded its application wings in almost all areas. From individual end-users, small scale business to large organizations. All of them are now free from the maintenance, updating the software and taking the advantage of low-cost investments just by hiring the services and required applications from the cloud rather than building and maintaining the same. Though these advantages are creating much demand for cloud services with more required features at the same time, a challenge comes on the other side from attacks on client’s data in the cloud. It becomes more difficult for the investigator to carry out the investigation during cyber-attacks on the cloud. During the attacks, there is a need for a quick response when certain anti-forensics is carried out to mislead the investigators. They may lead to waste of time, efforts, and spent cost. This paper presents a unique methodology to mitigate anti-forensics in a cloud with the effective usage of the relevant graphs. With the effective usage of graphs by the generation of attack, evidence and anti-forensic graphs helpful for the investigator to understand the cause and to carry out relatively countermeasures right way without being deviated by the anti-forensics.
Keywords: attack graph, evidence graph, anti-forensic graph.
Scope of the Article: Cloud Computing