Paper Title
Digital Forensic Technique Based on Exception Logs for Cloud

Abstract
Cloud computing has introduced convenient ways of data storage and data sharing without having to invest in costly hardware and software. Ubiquitous computing made it even more simpler as users can use handheld devices such as mobile phones and smart phones to upload, download, share text, photos, videos easily on cloud application. But hackers and criminals committing digital crimes are equally benefitted as no standard guidelines, procedures, methods are in existence to tackle with the crimes committed in the cloud environment. Digital Forensic process applicable on static devices cannot be applied directly to cloud environment. Hence, a new approach is proposed in this paper. We are analyzing Exception Logs generated by the application uploaded in the cloud environment. Analysis of these logs will lead to the determination of malicious activities, malicious users, state of the machine at the time of the incident and many other factors. Keywords - Exception Logs, Twitter, Virtual Machine Monitor (VMM), Forensic Integration Architecture (FIA).