Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review
Abstract
:1. Introduction
2. Background
- Detecting cloud crimes related to data and activities conducted through cloud services, such as security breaches, electronic fraud, data theft, and espionage.
- Providing legal evidence that can be used in courts to help solve crimes.
- Maintaining cloud stability by identifying weaknesses in the cloud infrastructure to prevent future attacks.
- Supporting international legal investigations by analyzing cloud user data and tracking illicit activities online.
2.1. Overview of Cloud Computing
2.1.1. Cloud Deployment Models
- Public Cloud: This is considered the most common of the deployment models because it is accessible to the general public, as its name implies, and available to everyone. In other words, companies lease resources to users based on their needs only, on a pay-as-you-go principle. Some offer free services but with limitations. There is a demand for them because they do not require maintenance or hardware changes on the part of the client [15].
- Private Cloud: We are not differentiating in the cloud infrastructure as all models are similar, and the technical structure of the private cloud is similar to the public cloud. However, the main difference lies in cloud ownership as it falls under the control of the company owner only. Maintenance and setup are carried out in a dedicated location belonging to the owning company. However, it is considered better in terms of security as it achieves high-level access authorization management. Only authorized personnel designated by the company are allowed access to the stored resources [16].
- Hybrid Cloud: This is considered a blend of the benefits of both public and private clouds, with high-quality management and protection policies applied. It provides a fundamental level of security and substantial resources. The hybrid cloud operates on the principle of segmentation, where there is a portion for protecting sensitive information from loss or damage and another portion for public deployment and general use. This cloud is typically owned by the company owner who leases it [16].
2.1.2. Cloud Service Models
- Ease of access and use by customers.
- Automatic updates are performed by the service provider.
- Customers are not restricted to a specific type of device to access the service.
- Cost savings for the client, as they pay a monthly subscription instead of purchasing the service.
- It is highly suitable for developers as it promotes a collaborative environment among them.
- It relieves developers from the burden of updates by means of an automatic system and software updates.
- It offers responsiveness and seamless integration with other cloud services.
- It allows resource consumption to be tailored to the specific needs of each client or developer.
- Scalable Resource Provisioning: Instead of purchasing resources, this model offers resource expansion based on the company’s needs. Resources are provided as a service in exchange for a monthly subscription.
- High-Level Security and Data Protection: This enhances client information and data with a high level of security and protection.
- Deployment Flexibility: This type of cloud service makes it possible to deploy in the region desired by the client, as providers typically own data centers in various regions.
2.2. Digital Forensics
2.3. Cloud Forensic Analysis Assists in Conducting Cloud Forensic Investigations
2.4. Cloud Forensics
- Gathering information from cloud service providers.
- Auditing activities that occurred within the cloud.
- Obtaining evidence related to unauthorized access or any breaches.
- Analyzing all the aforementioned points to identify suspects.
- Investigating and obtaining the outcome.
2.4.1. The Impact on Forensic Strategies
- Impact of the Cloud Deployment Models.Utilization of the public cloud involves the sharing of resources among numerous tenants, creating challenges in effectively segregating forensics data without impacting others. It is important to include forensic strategies to separate each tenant accurately. The legal agreement with cloud service providers plays a crucial role in ensuring access to forensics data [20].The private cloud offers a high level of control and customization, but this comes at a significant cost and results in management complexity. The organization must ensure robust security measures and implement effective forensic strategies. These strategies should have the most control over the infrastructure to enforce various policies. Consequently, the organization can develop and deploy specialized tools and protocols within the private cloud for forensic purposes [21].Integrating both private and public cloud services into the hybrid cloud may lead to challenges in conducting forensic investigations due to varying levels of control over data and infrastructure. Investigators must navigate through different policies and forensic tools utilized across the data sources [20].The community cloud facilitates data sharing between organizations with similar interests and simplifies forensic efforts through standardized policies and procedures. The nature of the infrastructure presents similar challenges to those encountered in public cloud environments when separating data [20].
- Impact of Service Models.Investigators in the IaaS models have access to resources at a lower level, such as virtual machines and storage systems. This simplifies detailed forensic analysis, but requires a deep understanding of the virtual environment and the ability to manage and analyze a vast amount of data [20].In the PaaS models, most of the infrastructure is abstracted, making it difficult to access primary data for forensic purposes. Investigators must collaborate closely with cloud service providers to obtain the required logs and other evidence, potentially causing delays in the investigation [20].The SaaS model presents a significant challenge for the forensic field, with a high level of obfuscation and limited visibility into the infrastructure. Service providers control access to forensic data, leading to legal procedures to obtain the necessary evidence [20].
2.4.2. Challenges in Cloud Forensics
2.5. Need for Cloud Forensics
2.5.1. Cases Requiring Cloud Analysis
2.5.2. The Need for Cloud Forensic Investigation Arises from Several Factors
2.6. Cloud Security Concerns
2.7. Process of Cloud Forensics
2.8. Valuable Practical and Innovative Perspectives of Cloud Forensics
2.9. Discussion
3. Methodology
4. Related Works
Literature Reviews
5. Findings and Insights
5.1. Challenges in Cloud Forensics
- Technical IssuesCloud computing presents various technical challenges when it comes to preserving digital evidence, one of which involves safeguarding the evidence against any unauthorized modifications.
- Legal IssuesThe issue at hand pertains to privacy, which poses a significant obstacle for investigators. Consequently, investigators must meticulously and lawfully store the data they have collected.
- Resource IssuesConducting investigations in a cloud environment presents a range of challenges for investigators, including limitations that impact various aspects of digital forensics.
5.2. Techniques That Are Used to Solve the Challenges
6. Comparison of Systematic Literature Review with Another Paper
7. Conclusions
8. Future Works
- Addressing security vulnerabilities: Given the constantly evolving nature of cybersecurity threats, future research could concentrate on identifying and mitigating security vulnerabilities in cloud environments. This could involve developing strategies to detect and prevent insider attacks, data breaches, and other security incidents that may impact forensic investigations.
- Improving forensic analysis techniques: Research efforts could be directed towards enhancing forensic analysis techniques to overcome the unique challenges posed by cloud environments. This could involve exploring advanced methods for data recovery, memory forensics, and network traffic analysis techniques that are specifically optimized for cloud-based data.
- Promoting collaboration and knowledge sharing: Encouraging collaboration and knowledge sharing among researchers, practitioners, law enforcement agencies, and cloud service providers is crucial for advancing the field of cloud forensics. Future research could explore mechanisms for facilitating collaboration, such as establishing interdisciplinary research networks, organizing workshops and conferences, and creating repositories of best practices and case studies.
- Implement comprehensive logging and monitoring: It is important to verify that all cloud services have been set up to produce comprehensive logs and to consistently review and analyze these logs.
- Data preservation and collection: Create uniform protocols for safeguarding and gathering digital evidence within cloud settings to guarantee the reliability and acceptability of information.
- Ensure forensic readiness: Get ready for possible forensic investigations by integrating forensic readiness into the corporate culture and cloud deployment plan.
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Mell, P.; Grance, T. The NIST Definition of Cloud Computing; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2011; pp. 800–1457. [CrossRef]
- Bhardwaj, A.K.; Garg, L.; Garg, A.; Gajpa, Y. E-Learning during COVID-19 Outbreak: Cloud Computing Adoption in Indian Public Universities. Comput. Mater. Contin. 2021, 66, 2471–2492. [Google Scholar] [CrossRef]
- Njenga, K.; Garg, L.; Bhardwaj, A.K.; Prakash, V.; Bawa, S. The cloud computing adoption in higher learning institutions in Kenya: Hindering factors and recommendations for the way forward. Telemat. Inform. 2019, 38, 225–246. [Google Scholar] [CrossRef]
- Karagiannis, C.; Vergidis, K. Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal. Information 2021, 12, 181. [Google Scholar] [CrossRef]
- Ali, K.M. Digital Forensics Best Practices and Managerial Implications. In Proceedings of the 2012 Fourth International Conference on Computational Intelligence, Communication Systems and Networks, Phuket, Thailand, 24–26 July 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 196–199. [Google Scholar] [CrossRef]
- Ruan, K.; Carthy, J.; Kechadi, T.; Baggili, I. Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digit. Investig. 2013, 10, 34–43. [Google Scholar] [CrossRef]
- Simou, S.; Kalloniatis, C.; Gritzalis, S.; Mouratidis, H. A survey on cloud forensics challenges and solutions. Secur. Commun. Netw. 2016, 9, 6285–6314. [Google Scholar] [CrossRef]
- Martini, B.; Choo, K.K.R. Cloud storage forensics: OwnCloud as a case study. Digit. Investig. 2013, 10, 287–299. [Google Scholar] [CrossRef]
- Taylor, M.; Haggerty, J.; Gresty, D.; Lamb, D. Forensic investigation of cloud computing systems. Netw. Secur. 2011, 2011, 4–10. [Google Scholar] [CrossRef]
- Marty, R. Cloud application logging for forensics. In ACM Symposium on Applied Computing, Proceedings of the SAC’11: The 2011 ACM Symposium on Applied Computing, TaiChung, Taiwan, 21–24 March 2011; Association for Computing Machinery: New York, NY, USA, 2011; pp. 178–184. [Google Scholar] [CrossRef]
- Dykstra, J.; Sherman, A.T. Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digit. Investig. 2013, 10, S87–S95. [Google Scholar] [CrossRef]
- Vadetay Saraswathi Bai, T.S. A Systematic Literature Review on Cloud Forensics in Cloud Environment. Int. J. Intell. Syst. Appl. Eng. 2023, 11, 565–578. [Google Scholar]
- Ruan, K.; Baggili, I.; Prof, J.; Carthy, P.; Kechadi, T. Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. Researchate. 2011. Available online: https://www.researchgate.net/publication/228419717_Survey_on_cloud_forensics_and_critical_criteria_for_cloud_forensic_capability_A_preliminary_analysis (accessed on 11 July 2024).
- Casino, F.; Dasaklis, T.K.; Spathoulas, G.P.; Anagnostopoulos, M.; Ghosal, A.; Borocz, I.; Solanas, A.; Conti, M.; Patsakis, C. Research Trends, Challenges, and Emerging Topics in Digital Forensics: A Review of Reviews. IEEE Access 2022, 10, 25464–25493. [Google Scholar] [CrossRef]
- Bamiah, M.; Brohi, S. Exploring the Cloud Deployment and Service Delivery Models. Int. J. Res. Rev. Inf. Sci. 2011, 3, 2046–6439. Available online: https://www.researchgate.net/publication/257995661_Exploring_the_Cloud_Deployment_and_Service_Delivery_Models (accessed on 3 July 2024).
- Gill, S.S.; Wu, H.; Patros, P.; Ottaviani, C.; Arora, P.; Pujol, V.C.; Haunschild, D.; Parlikad, A.K.; Cetinkaya, O.; Lutfiyya, H.; et al. Modern computing: Vision and challenges. Telemat. Inform. Rep. 2024, 13, 100116. [Google Scholar] [CrossRef]
- Alqahtany, S.; Clarke, N.; Furnell, S.; Reich, C. Cloud Forensics: A Review of Challenges, Solutions and Open Problems. In Proceedings of the 2015 International Conference on Cloud Computing (ICCC), Riyadh, Saudi Arabia, 26–29 April 2015; pp. 1–9. [Google Scholar]
- Sandhu, A.K. Big Data with Cloud Computing: Discussions and Challenges. Big Data Min. Anal. 2022, 5, 32–40. [Google Scholar] [CrossRef]
- Almulla, S.; Iraqi, Y.; Jones, A. Cloud forensics: A research perspective. In Proceedings of the 2013 9th International Conference on Innovations in Information Technology (IIT), Al Ain, United Arab Emirates, 17–19 March 2013; pp. 66–71. [Google Scholar] [CrossRef]
- Alazab, A.; Khraisat, A.; Singh, S. A Review on the Internet of Things (IoT) Forensics: Challenges, Techniques, and Evaluation of Digital Forensic Tools; Intechopen: London, UK, 2023. [Google Scholar] [CrossRef]
- Abdulsalam, Y.S.; Hedabou, M. Security and Privacy in Cloud Computing: Technical Review. Future Internet 2022, 14, 11. [Google Scholar] [CrossRef]
- Microsoft. Microsoft Corp. v. United States. Supremecourt 2018. Available online: https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf (accessed on 11 July 2024).
- Dykstra, J.; Sherman, A.T. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digit. Investig. 2012, 9, S90–S98. [Google Scholar] [CrossRef]
- Farina, J.; Scanlon, M.; Le-Khac, N.A.; Kechadi, M.T. Overview of the Forensic Investigation of Cloud Services. In Proceedings of the 2015 10th International Conference on Availability, Reliability and Security, Toulouse, France, 24–27 August 2015; pp. 556–565. [Google Scholar] [CrossRef]
- Malik, A.; Park, T.J.; Ishtiaq, H.; Ryou, J.C.; Kim, K.I. Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges. Sensors 2024, 24, 433. [Google Scholar] [CrossRef] [PubMed]
- Chinedu, P.; Nwankwo, W.; Daniel; Shaba, M.; Momoh, M. Cloud Security Concerns: Assessing the Fears of Service Adoption. Arch. Sci. Technol. 2020, 1, 164–174. Available online: https://www.researchgate.net/publication/349607793_Cloud_Security_Concerns_Assessing_the_Fears_of_Service_Adoption (accessed on 13 July 2024).
- Ruan, K.; Carthy, J.; Kechadi, T.; Crosbie, M. Cloud forensics: An overview. ResearchGate 2011. Available online: https://www.researchgate.net/publication/229021339_Cloud_forensics_An_overview (accessed on 11 July 2024).
- Microsoft. Governance, Security, and Compliance in Azure. Cloud Adoption Framework 2024. Available online: https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/azure-setup-guide/govern-org-compliance?tabs=AzureSecurityCenter (accessed on 25 July 2024).
- AWS. AWS Security Best Practices. AWS Whitepaper 2016. Available online: https://docs.aws.amazon.com/whitepapers/latest/aws-security-best-practices/welcome.html (accessed on 25 July 2024).
- Catteddu, D. Cloud Computing: Benefits, Risks and Recommendations for Information Security. In Web Application Security: Iberic Web Application Security Conference, IBWAS; Springer: Berlin/Heidelberg, Germany, 2010; Volume 72, pp. 93–113. [Google Scholar] [CrossRef]
- Purnaye, P.; Kulkarni, V. A Comprehensive Study of Cloud Forensics. Arch. Comput. Methods Eng. 2021, 29, 33–46. [Google Scholar] [CrossRef]
- Mohammmed, S.; Sridevi, R. A Survey on Digital Forensics Phases, Tools and Challenges. In Proceedings of the Third International Conference on Computational Intelligence and Informatics: ICCII 2018, Hyderabad, India, 28–29 December 2018; Volume 1090, pp. 237–248. Available online: https://api.semanticscholar.org/CorpusID:215834965 (accessed on 24 July 2024).
- Yassin, W.M.; Abdollah, M.F.; Ahmad, R.; Yunos, Z.; Ariffin, A.F.M. Cloud Forensic Challenges and Recommendations: A Review. OIC-CERT J. Cyber Secur. 2020, 2. Available online: https://api.semanticscholar.org/CorpusID:216175392 (accessed on 9 July 2024).
- Fernando, V. Cyber Forensics Tools: A Review on Mechanism and Emerging Challenges. In Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 19–21 April 2021; pp. 1–7. [Google Scholar] [CrossRef]
- Pandi (Jain), G.S.; Shah, S.; Wandra, K. Exploration of Vulnerabilities, Threats and Forensic Issues and its impact on the Distributed Environment of Cloud and its mitigation. Procedia Comput. Sci. 2020, 167, 163–173. [Google Scholar] [CrossRef]
- CHOI, D.H. Digital forensic: Challenges and solution in the protection of corporate crime. J. Ind. Distrib. Bus. 2021, 12, 47–55. [Google Scholar] [CrossRef]
- Sharma, P.; Arora, D.; Sakthivel, T. Enhanced Forensic Process for Improving Mobile Cloud Traceability in Cloud-Based Mobile Applications. Procedia Comput. Sci. 2020, 167, 907–917. [Google Scholar] [CrossRef]
- Vaidya, N. Cloud Forensics: Trends and Challenges. Int. J. Eng. Res. Technol. 2020, 9. Available online: https://www.ijert.org/research/cloud-forensics-trends-and-challenges-IJERTV9IS090415.pdf (accessed on 20 June 2024).
- Isaac Abiodun, O.; Alawida, M.; Esther Omolara, A.; Alabdulatif, A. Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 10217–10245. [Google Scholar] [CrossRef]
- Deebak, B.; AL-Turjman, F. Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing. Future Gener. Comput. Syst. 2021, 116, 406–425. [Google Scholar] [CrossRef]
- Sharma, P.; Goel, S. A Practical Guide on Security and Privacy in Cyber-Physical Systems: Foundations, Applications and Limitations. World Sci. Ser. Digit. Forensics Cybersecur. 2023, 3, 264. [Google Scholar] [CrossRef]
- Alenezi, A.M. Digital and Cloud Forensic Challenges. arXiv 2023, arXiv:2305.03059. [Google Scholar] [CrossRef]
- Kaleem, H.; Ahmed, I. Cloud Forensics: Challenges and Solutions (Blockchain Based Solutions). Innov. Comput. Rev. 2021, 1, 1–26. [Google Scholar] [CrossRef]
- Alouffi, B.; Hassnain, M.; Alharbi, A.; Alosaimi, W.; Alyami, H.; Ayaz, M. A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access 2021, 9, 57792–57807. [Google Scholar] [CrossRef]
- Ali, S.A.; Memon, S.; Sahito, F. Challenges and Solutions in Cloud Forensics. In Proceedings of the 2018 2nd International Conference on Cloud and Big Data Computing, Barcelona, Spain, 3–5 August 2018; pp. 6–10. [Google Scholar] [CrossRef]
- Prakash, V.; Williams, A.; Garg, L.; Savaglio, C.; Bawa, S. Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems. Electronics 2021, 10, 1229. [Google Scholar] [CrossRef]
- Hemdan, E.E.D.; Manjaiah, D. An efficient digital forensic model for cybercrimes investigation in cloud computing. Multimedia Tools and Applications. In Multimedia Tools and Applications, Proceedings of the ICCBDC’18: 2018 2nd International Conference on Cloud and Big Data Computing, Barcelona, Spain, 3–5 August 2018; Association for Computing Machinery: New York, NY, USA, 2018; Volume 80, pp. 14255–14282. [Google Scholar] [CrossRef]
- Joshi, S.N.; Chillarge, G.R. Secure Log Scheme for Cloud Forensics. In Proceedings of the 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 7–9 October 2020; pp. 188–193. [Google Scholar] [CrossRef]
- Javed, A.R.; Ahmed, W.; Alazab, M.; Jalil, Z.; Kifayat, K.; Gadekallu, T.R. A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions. IEEE Access 2022, 10, 11065–11089. [Google Scholar] [CrossRef]
Cloud Deployment Models | Features | Drawbacks |
---|---|---|
Public Cloud |
|
|
Private Cloud |
|
|
Hybrid Cloud |
|
|
Tool | Description |
---|---|
Data Recovery Software | Used to retrieve deleted or lost data from digital devices such as computers and smartphones. |
Digital Analysis Software | Utilized for analyzing various forms of digital data, including images, videos, and text files. |
Network Extraction and Analysis Tools | Employed to analyze network traffic and extract data related to network communications and online activities. |
Encryption and Decryption Software | Utilized for analyzing encrypted data and decrypting it to extract analyzable information. |
Image and Video Recovery Tools | Assist in recovering deleted or hidden images and video clips from digital devices. |
Smart Analysis and Pattern Recognition Software | Used for intelligent data analysis and detecting unusual patterns and trends that may indicate illicit activities. |
Characteristics of Cloud | Forensics Challenge |
---|---|
Scalability | Ensuring data integrity and maintaining chain of custody during dynamic resource scaling. |
Accessibility | Investigating unauthorized access and data breaches across remote locations with different access levels. |
Shared Resources | Managing data combination challenges and isolating digital evidence within a shared infrastructure. |
Virtualization | Addressing forensic analysis problem in virtualized systems and abstracted hardware environments. |
Data Distribution | Handling the challenges associated with legal jurisdictions and data locations in cloud storage systems spread across multiple geographic regions. |
Ref. | Techniques | Challenges | Main Finding |
---|---|---|---|
[31] |
|
|
|
[32] |
|
|
|
[25] |
|
|
|
[34] |
|
|
|
[35] |
|
|
|
[36] |
|
|
|
[37] |
|
|
|
[38] |
|
|
|
[39] |
|
|
|
[40] |
|
|
|
[41] |
|
|
|
[42] |
|
|
|
[33] |
|
|
|
[43] |
|
|
|
[44] |
|
|
|
[45] |
|
|
|
[46] |
|
|
|
[47] |
|
|
|
[48] |
|
|
|
[4] |
|
|
|
Technical Challenges | Resource Challenges | Legal Challenges |
---|---|---|
|
|
|
|
|
|
Challenge | Type | Potential Security Solution |
---|---|---|
Identification/gathering of evidence | Technical | Implement advanced data collection tools and techniques for efficient evidence gathering. |
Architectural support | Technical | Develop forensic tools that are compatible with various cloud architectures. |
Data privacy and security | Technical | Utilize strong encryption methods and access controls to protect data integrity and confidentiality. |
Protecting evidence | Technical | Establish secure storage mechanisms and access controls to prevent tampering with evidence. |
Customer’s knowledge and lack of control | Resource | Provide training and education to users to enhance their understanding of cloud security best practices. |
Restricted authority over access | Resource | Implement role-based access controls and privilege management to restrict unauthorized access. |
Accuracy | Resource | Implement data validation and integrity checks to ensure the accuracy of forensic findings. |
Duplication of data | Resource | Establish data deduplication processes to eliminate redundant data and improve storage efficiency. |
Absence of analysis and collection of evidence | Legal | Establish clear legal procedures for evidence collection and analysis in cloud environments. |
Integrity | Legal | Ensure data integrity throughout the forensic investigation process to maintain the credibility of evidence. |
Multi-tenants | Legal | Develop protocols for handling data from multiple tenants in shared cloud environments to prevent data leakage. |
Privacy | Legal | Implement privacy-enhancing technologies and policies to protect sensitive information during investigations. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alshabibi, M.M.; Bu dookhi, A.K.; Hafizur Rahman, M.M. Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review. Computers 2024, 13, 213. https://doi.org/10.3390/computers13080213
Alshabibi MM, Bu dookhi AK, Hafizur Rahman MM. Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review. Computers. 2024; 13(8):213. https://doi.org/10.3390/computers13080213
Chicago/Turabian StyleAlshabibi, Munirah Maher, Alanood Khaled Bu dookhi, and M. M. Hafizur Rahman. 2024. "Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review" Computers 13, no. 8: 213. https://doi.org/10.3390/computers13080213
APA StyleAlshabibi, M. M., Bu dookhi, A. K., & Hafizur Rahman, M. M. (2024). Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review. Computers, 13(8), 213. https://doi.org/10.3390/computers13080213