%0 Journal Article %T Regenerating Cloud Attack Scenarios using LVM2 based System Snapshots for Forensic Analysis %A G. Geethakumari %A Abha Belorkar %J International Journal of Cloud Computing and Services Science (IJ-CLOSER) %D 2012 %I Insititute of Advanced Engineering and Science (IAES) %R 10.11591/closer.v1i3.803 %X Even though Cloud Computing has proved its utility and efficacy in many areas, security threats are a major obstacle in its widespread application. Cloud Forensics, with its existing equipment, has played an important role in improving our understanding of these threats, thereby contributing to the development of better and more robust cloud computing systems.In our earlier work, we introduced the use of fuzzy clustering techniques to detect and record malicious activities in cloudfor building strong and reliable evidences of the attacks. We now discuss the method in detail with certain essential aspects of its implementation. We also suggest ways to improve the time-complexity of the relevant back-end calculations. %U http://www.iaesjournal.com/online/index.php/IJ-CLOSER/article/view/803