Forensic investigation of cloud computing systems

Cloud computing describes a computing concept where software services, and the resources they use, operate as (and on) a virtualised platform across many different host machines, connected by the Internet or an organisation's internal network. From a business or system user's point of view, the cloud provides, via virtualisation, a single platform or service collection in which it can operate. Cloud computing is a new concept in the distributed processing of data and is likely to make computer forensic evidence acquisition and evidence analysis increasingly complex. Currently there do not appear to be any published guidelines that specifically address the conduct of computer forensic investigations of cloud computing systems. In order to understand and analyse evidence within this environment, computer forensics examiners will require a broader range of technical knowledge across multiple hardware platforms and operating systems. Dr Mark Taylor et al examine the issues concerning the forensic investigation of cloud systems.

[1]  Robert L. Grossman,et al.  The Case for Cloud Computing , 2009, IT Professional.

[2]  Simon S. Y. Shim,et al.  The Web as the Ubiquitous Computer , 2009, Computer.

[3]  Golden G. Richard,et al.  Next-generation digital forensics , 2006, CACM.

[4]  M. P. F. C. A. J. Sammes BSc,et al.  Forensic Computing , 2000, Practitioner Series.

[5]  Malek Ben Salem,et al.  Designing Host and Network Sensors to Mitigate the Insider Threat , 2009, IEEE Security & Privacy.

[6]  Mark Taylor,et al.  Managing corporate computer forensics , 2006 .

[7]  George M. Mohay,et al.  Computer and Intrusion Forensics , 2003 .

[8]  John Viega,et al.  Cloud Computing and the Common Man , 2009, Computer.

[9]  Shunxiang Wu,et al.  Research of an E-mail forensic and analysis system based on visualization , 2009, 2009 Asia-Pacific Conference on Computational Intelligence and Industrial Applications (PACIIA).