Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing

Dublin Core

Title

Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing

Subject

framework; ADAM; NIST; cloud; comparison

Description

As information technology advances, the associated risks also increase, particularly in the field of private cloud computing
services. These services are subject to potential risks of internal abuse, either due to system vulnerabilities or other factors.
However, the investigation of these incidents in private cloud computing varies greatly due to the different frameworks and
unique characteristics of each cloud service. The lack of a standardized approach to analyzing and assessing investigative
processes in cloud computing services has been a persistent problem. This lack of consensus impacts the accuracy, efficiency,
and process of data acquisition when dealing with digital evidence in each method, causing concern among researchers. To
overcome this, a comparative study was carried out with a focus on the ADAM (The Advanced Data Acquisition Model) method
and the NIST (National Institute of Standards and Technology) method. The goal is to identify the most effective investigative
process for dealing with cyber attack incidents on both the server and client side of cloud computing services. By testing these
methods in a network that is built on private cloud computing services, then for the results from this research include the
weaknesses and strengths of the ADAM and NIST methods are found when applied to cloud computing case studies and these
have not been identified in previous research, then produce recommendations for investigators when conducting investigations
on case studies on cloud computing, and in this study managed to find a bug in the ownCloud application version 10.9.1. Then
this study also aims to provide researchers with valuable references to carry out analysis and assessment in the investigative
process, where standardization is still an unresolved issue.

Creator

Reza Febriana, Ahmad Luthfi

Source

http://jurnal.iaii.or.id

Publisher

Professional Organization Ikatan Ahli Informatika Indonesia (IAII)/Indonesian Informatics Experts Association

Date

October 2023

Contributor

Sri Wahyuni

Rights

ISSN Media Electronic: 2580-0760

Format

PDF

Language

English

Type

Text

Files

Collection

Tags

,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon , ,Repository, Repository Horizon University Indonesia, Repository Universitas Horizon Indonesia, Horizon.ac.id, Horizon University Indonesia, Universitas Horizon Indonesia, HorizonU, Repo Horizon ,

Citation

Reza Febriana, Ahmad Luthfi, “Comparative Study of Cloud Forensic Investigation Using ADAM And NIST 800-86 Methods in Private Cloud Computing,” Repository Horizon University Indonesia, accessed January 12, 2026, https://repository.horizon.ac.id/items/show/10095.