Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing
Dublin Core
Title
Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing
Subject
framework; ADAM; NIST; cloud; comparison
Description
As information technology advances, the associated risks also increase, particularly in the field of private cloud computing
services. These services are subject to potential risks of internal abuse, either due to system vulnerabilities or other factors.
However, the investigation of these incidents in private cloud computing varies greatly due to the different frameworks and
unique characteristics of each cloud service. The lack of a standardized approach to analyzing and assessing investigative
processes in cloud computing services has been a persistent problem. This lack of consensus impacts the accuracy, efficiency,
and process of data acquisition when dealing with digital evidence in each method, causing concern among researchers. To
overcome this, a comparative study was carried out with a focus on the ADAM (The Advanced Data Acquisition Model) method
and the NIST (National Institute of Standards and Technology) method. The goal is to identify the most effective investigative
process for dealing with cyber attack incidents on both the server and client side of cloud computing services. By testing these
methods in a network that is built on private cloud computing services, then for the results from this research include the
weaknesses and strengths of the ADAM and NIST methods are found when applied to cloud computing case studies and these
have not been identified in previous research, then produce recommendations for investigators when conducting investigations
on case studies on cloud computing, and in this study managed to find a bug in the ownCloud application version 10.9.1. Then
this study also aims to provide researchers with valuable references to carry out analysis and assessment in the investigative
process, where standardization is still an unresolved issue.
services. These services are subject to potential risks of internal abuse, either due to system vulnerabilities or other factors.
However, the investigation of these incidents in private cloud computing varies greatly due to the different frameworks and
unique characteristics of each cloud service. The lack of a standardized approach to analyzing and assessing investigative
processes in cloud computing services has been a persistent problem. This lack of consensus impacts the accuracy, efficiency,
and process of data acquisition when dealing with digital evidence in each method, causing concern among researchers. To
overcome this, a comparative study was carried out with a focus on the ADAM (The Advanced Data Acquisition Model) method
and the NIST (National Institute of Standards and Technology) method. The goal is to identify the most effective investigative
process for dealing with cyber attack incidents on both the server and client side of cloud computing services. By testing these
methods in a network that is built on private cloud computing services, then for the results from this research include the
weaknesses and strengths of the ADAM and NIST methods are found when applied to cloud computing case studies and these
have not been identified in previous research, then produce recommendations for investigators when conducting investigations
on case studies on cloud computing, and in this study managed to find a bug in the ownCloud application version 10.9.1. Then
this study also aims to provide researchers with valuable references to carry out analysis and assessment in the investigative
process, where standardization is still an unresolved issue.
Creator
Reza Febriana, Ahmad Luthfi
Source
http://jurnal.iaii.or.id
Publisher
Professional Organization Ikatan Ahli Informatika Indonesia (IAII)/Indonesian Informatics Experts Association
Date
October 2023
Contributor
Sri Wahyuni
Rights
ISSN Media Electronic: 2580-0760
Format
PDF
Language
English
Type
Text
Files
Collection
Citation
Reza Febriana, Ahmad Luthfi, “Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing,” Repository Horizon University Indonesia, accessed January 12, 2026, https://repository.horizon.ac.id/items/show/10095.