Abstract:
Forensic analysis of cloud computing traffic involves investigating and analyzing network traffic within cloud computing
environments to detect suspicious or malicious activities. This includes examining network connections, data transfer patterns, and data
payloads. A comprehensive understanding of cloud infrastructure and network protocols is essential for effectively analyzing IoT-based
cloud computing traffic. The growing utilization of IoT devices in cloud environments necessitates efficient forensic analysis methods
to investigate and respond to security incidents. This paper addresses the challenges and considerations associated with forensic
analysis in IoT-based cloud computing systems, taking into account the unique characteristics of IoT devices and the distributed
nature of cloud environments. We propose a framework for conducting forensic analysis in IoT-based cloud computing systems,
which encompasses guidelines for data collection, preservation, and analysis. Additionally, we present case studies demonstrating the
efficacy of our proposed framework in real-world IoT-based cloud computing scenarios. The outcomes of this research contribute
to a deeper understanding of the forensic challenges in IoT-based cloud computing systems and offer practical solutions to overcome them