Membangun Framework Konseptual Terintegrasi Menggunakan Metode Composite Logic untuk Cloud Forensic Readiness pada Organisasi
DOI:
https://doi.org/10.30865/mib.v6i1.3427Keywords:
Framework, Forensic Readiness, Cloud Forensic Readiness, Composite Logic, Incident Responses, Cloud ComputingAbstract
In the Forensic Readiness approach, incident readiness is the goal of the company or organization in dealing with incidents that may occur. Forensic Readiness can consist of actions or steps, technical and non-technical, that supposedly maximize an organization's ability to use digital evidence. A well-built Cloud Forensic Readiness Framework can help speed up and simplify decision-making regarding an incident occurring in a cloud computing environment. This creates new opportunities for collaboration in the field of digital forensics and cloud computing or cloud computing, so that solutions can be studied and researched by analyzing various literature sources of cloud computing forensic readiness framework and building an integrated cloud forensic readiness framework on an institutional scale using the composite logic method. With the completeness of the readiness framework designed, it is a kind of research that is expected to ease decision making process for organizational stakeholders to handle incident responses.References
NIST, “NIST - Draft NISTIR 8006 - NIST Cloud Computing Forensic Science Challenges,†Nist, 2014, [Online]. Available: http://safegov.org/media/72648/nist_digital_forensics_draft_8006.pdf.
G. Grispos, T. Storer, and W. B. Glisson, “Calm before the storm: The challenges of cloud computing in digital forensics,†Int. J. Digit. Crime Forensics, vol. 4, no. 2, pp. 28–48, Apr. 2012, doi: 10.4018/jdcf.2012040103.
B. Martini and K. K. R. Choo, “An integrated conceptual digital forensic framework for cloud computing,†Digital Investigation, vol. 9, no. 2. Elsevier Ltd, pp. 71–80, 2012, doi: 10.1016/j.diin.2012.07.001.
G. Grispos, T. Storer, and W. B. Glisson, “Calm before the storm: The challenges of cloud computing in digital forensics,†Emerg. Digit. Forensics Appl. Crime Detect. Prev. Secur., no. May 2014, pp. 211–233, 2013, doi: 10.4018/978-1-4666-4006-1.ch015.
B. Martini and K. K. R. Choo, “Cloud storage forensics: OwnCloud as a case study,†Digit. Investig., vol. 10, no. 4, pp. 287–299, 2013, doi: 10.1016/j.diin.2013.08.005.
J. Tan, “Forensic readiness,†2001.
R. Rowlingson, “A Ten Step Process for Forensic Readiness,†2004. [Online]. Available: www.ijde.org.
A. Mouhtaropoulos, C. T. Li, and M. Grobler, “Digital forensic readiness: Are we there yet?,†J. Int. Commer. Law Technol., vol. 9, no. 3, pp. 173–179, 2014.
D. Barske, A. Stander, and J. Jordaan, “A digital forensic readiness framework for South African SME’s,†Proc. 2010 Inf. Secur. South Africa Conf. ISSA 2010, 2010, doi: 10.1109/ISSA.2010.5588281.
V. R. Kebande, H. S. Venter, and H. S. Venter, “A Cloud Forensic Readiness Model Using a Botnet as a Service Pre-incident Detection approaches in the Cloud View project Proactive and Reactive Digital Forensic Technologies View project A Cloud Forensic Readiness Model Using a Botnet as a Service,†2014, doi: 10.13140/2.1.4880.2249.
V. Kebande and H. Venter, “Requirements for achieving digital forensic readiness in the cloud environment using an NMB solution,†Proc. 11th Int. Conf. Cyber Warf. Secur. ICCWS 2016, no. March, pp. 399–406, 2016.
P. M. Trenwith and H. S. Venter, “Digital forensic readiness in the cloud,†2013 Inf. Secur. South Africa - Proc. ISSA 2013 Conf., no. March 2016, 2013, doi: 10.1109/ISSA.2013.6641055.
S. Park, Y. Kim, G. Park, O. Na, and H. Chang, “Research on digital forensic readiness design in a cloud computing-based smart work environment,†Sustain., vol. 10, no. 4, pp. 1–24, 2018, doi: 10.3390/su10041203.
P. M. Trenwith and H. S. Venter, “Digital forensic readiness in the cloud,†2013, doi: 10.1109/ISSA.2013.6641055.
V. R. Kebande and H. S. Venter, “CFRaaS: Architectural design of a Cloud Forensic Readiness as-a-Service Model using NMB solution as a forensic agent,†African J. Sci. Technol. Innov. Dev., vol. 11, no. 6, pp. 749–769, 2019, doi: 10.1080/20421338.2019.1585675.
A. N. Moussa, N. B. Ithnin, and O. A. M. Miaikil, “Conceptual forensic readiness framework for infrastructure as a service consumers,†in Proceedings - 2014 IEEE Conference on System, Process and Control, ICSPC 2014, Apr. 2014, pp. 162–167, doi: 10.1109/SPC.2014.7086250.
A. Alenezi, R. K. Hussein, R. J. Walters, and G. B. Wills, “A Framework for Cloud Forensic Readiness in Organizations,†in Proceedings - 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2017, Jun. 2017, pp. 199–204, doi: 10.1109/MobileCloud.2017.12.
A. N. Moussa, N. B. Ithnin, and O. A. M. Miaikil, “Conceptual forensic readiness framework for infrastructure as a service consumers,†Proc. - 2014 IEEE Conf. Syst. Process Control. ICSPC 2014, no. January 2018, pp. 162–167, 2014, doi: 10.1109/SPC.2014.7086250.
A. Alenezi, R. K. Hussein, R. J. Walters, and G. B. Wills, “A Framework for Cloud Forensic Readiness in Organizations,†Proc. - 5th IEEE Int. Conf. Mob. Cloud Comput. Serv. Eng. MobileCloud 2017, no. April, pp. 199–204, 2017, doi: 10.1109/MobileCloud.2017.12.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).