Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

About Cloud Forensics:Challenges and Solutions


Affiliations
1 Department of Information Technology, Pondicherry Engineering College, Puducherry, India
     

   Subscribe/Renew Journal


Cloud computing is gaining wide popularity due to low infrastructure cost and high resource utilization. Cloud can be private or public. Users can store their data and avail cloud sessions on pay-per-use basis. This multi-tenancy support can lead to several problems. Cloud forensics is a cross discipline of cloud computing and digital forensics. It ensures to find out the culprit when there is a security breach. Several techniques are proposed to secure user data and provide legally acceptable evidences in case of cyber crime. This chapter aims at discussing the issues and challenges of cloud forensics and the currently available solutions. Logs are widely accepted as legal evidence of how fraud was perpetrated. Creation and maintenance of logs also poses a number of challenges. This chapter also aims at exploring these challenges and solutions for managing logs.

Keywords

Cloud Security, Cloud Service Providers, Cloud Users, Service Level Agreement (SLA), Digital Forensics, Cloud Forensics Phases, Forensic Readiness, Log Formats, Log Architecture, Log Security, Log Database.
Subscription Login to verify subscription
User
Notifications
Font Size


  • Boampong, P. A., & Wahsheh, L. A. (2012). Different facets of security in the cloud. In Proceedings of the 15th Communications and Networking Simulation Symposium, (5, pp. 5.1-5.7), Society for Computer Simulation International, San Diego, CA, USA.
  • Comp TIA. (2012). 9th Annual Information Security Trends. Retrieved from https://www.comptia.org/resources/9th-annual-information-security-trends
  • Dykstra, J., & Sherman, A. T. (2011). Understanding issues in cloud Forensics: Two Hypothetical Case Studies. Journal of Network Forensics, 3(1), 19-31.
  • Eecke, P. V. (2015). Cloud Computing Legal issues. Retrieved from http://www.isaca.org/Groups/ProfessionalEnglish/cloudcomputing/GroupDocuments/DLA_Cloud computing legal issues.pdf
  • Hazhizume, K., Rosado, D. G., Fernandez-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(5), 1-13.
  • IDC. (2013). Worldwide and Regional Public IT Cloud Services 2013-2017 Forecast. Retrieved from http:// www.idc.com/get.doc.jsp?containerId=242464.
  • Hashizume, K., Rosado, D. G., Medina, E. F., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. International Journal of Internet Services and Applications, 4(5), 1-13.
  • Li, W., & Ping, L. (2009). Trust model to enhance security and interoperability of cloud environment. In proceedings of the 1st International Conference on Cloud Computing, Springer Berlin Heidelberg, Berlin, China, (pp. 69-79).
  • Mell, P., & Grance, T. (2009). The NIST Definition of Cloud Computing Version 15 NIST.
  • Reilly, D., Wren, C., & Berry, T. (2011). Cloud Computing: Pros and Cons for Computer forensic Investigations. International Journal of Multimedia and Image Processing, Infonomics Society, 1(1), 26-34.
  • Ruan, K., Carthy, J., Kechadi, T., & Crosbie, M. (2011). Cloud forensics: An Overview. Advances in Digital forensics, 7, 35-49.
  • Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2014). Cloud Forensics: Identifying the major issues and challenges, In Proceedings of 26th International Conference, CAiSE, Thessaloniki, Greece, June 16-20.
  • Skok, M. J., (2014). 2014 Future of Cloud Computing 4th Annual Survey Results http://mjskok.com/resource/2014-future-cloud-computing-4th-annual-survey-results Retrieved in June 2015.
  • Stephenson, P. (2003). A comprehensive approach to digital incident investigation. Information Security Technical Report, 8(2), 42-52.

Abstract Views: 291

PDF Views: 0




  • About Cloud Forensics:Challenges and Solutions

Abstract Views: 291  |  PDF Views: 0

Authors

Vaithianathan Geetha
Department of Information Technology, Pondicherry Engineering College, Puducherry, India

Abstract


Cloud computing is gaining wide popularity due to low infrastructure cost and high resource utilization. Cloud can be private or public. Users can store their data and avail cloud sessions on pay-per-use basis. This multi-tenancy support can lead to several problems. Cloud forensics is a cross discipline of cloud computing and digital forensics. It ensures to find out the culprit when there is a security breach. Several techniques are proposed to secure user data and provide legally acceptable evidences in case of cyber crime. This chapter aims at discussing the issues and challenges of cloud forensics and the currently available solutions. Logs are widely accepted as legal evidence of how fraud was perpetrated. Creation and maintenance of logs also poses a number of challenges. This chapter also aims at exploring these challenges and solutions for managing logs.

Keywords


Cloud Security, Cloud Service Providers, Cloud Users, Service Level Agreement (SLA), Digital Forensics, Cloud Forensics Phases, Forensic Readiness, Log Formats, Log Architecture, Log Security, Log Database.

References