Cloud Forensics Issues and Opportunities

Cloud computing technology is a rapidly growing field of study, which relies on sharing computing resources rather than having local servers or personal devices to handle applications. Most of the growth in this field is due to transfer of the traditional model of IT services to a novel model of cloud and the ubiquity of access to electronic and digital devices. Cloud computing posed a critical risk and challenges to digital investigators, but provides plenty of opportunities to investigators for improving the digital forensics. Moreover, cloud service providers and customers have yet to establish adequate forensic capabilities that could support investigations of criminal activities in the cloud. Notwithstanding the cloud presents some promising technical and economic benefits, users still resist to use cloud mainly due to security issues because it poses a challenge in doing cloud forensic investigations. Regarding this some research has been done, which propose solutions in doing forensic investigation. In this review paper, we take the first step towards reviewing the cloud forensics works that have been done by other researchers, and then do some discussion and analysis based on our findings to consider the opportunities and challenges confront the cloud forensics based on our findings.

[1]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[2]  Ali Dehghantanha,et al.  Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing Systems , 2011, CISIS.

[3]  Gail-Joon Ahn,et al.  Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.

[4]  Ali Dehghantanha,et al.  Towards a Pervasive Formal Privacy Language , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[5]  Ali Dehghantanha,et al.  Utilizing trusted platform module to mitigate botnet attacks , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[6]  Ali Dehghantanha Xml-Based Privacy Model in Pervasive Computing , 2008 .

[7]  Stephen Biggs,et al.  Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[8]  Ali Dehghantanha,et al.  Framework of digital forensics for the Samsung Star Series phone , 2011, 2011 3rd International Conference on Electronics Computer Technology.

[9]  Ali Dehghantanha,et al.  Forensics investigation challenges in cloud computing environments , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[10]  John Zic,et al.  A Cloud Architecture of Virtual Trusted Platform Modules , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[11]  Reza Boostani,et al.  A New Hybrid Algorithm to Solve the Task Scheduling Problem in Grid Computing , 2013 .

[12]  Ali Dehghantanha,et al.  UPM: User-Centered Privacy Model in Pervasive Computing Systems , 2009, 2009 International Conference on Future Computer and Communication.

[13]  Mark Taylor,et al.  Digital evidence in cloud computing systems , 2010, Comput. Law Secur. Rev..

[14]  Shaftab Ahmed,et al.  Tackling cloud security issues and forensics model , 2010, 7th International Symposium on High-capacity Optical Networks and Enabling Technologies.

[15]  Catherine Everett,et al.  Cloud computing – A question of trust , 2009 .

[16]  Ali Dehghantanha,et al.  Volatile memory acquisition using backup for forensic investigation , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[17]  Ali Dehghantanha,et al.  Towards green frameworks for digital forensics investigation , 2013 .

[18]  Tetsutaro Uehara,et al.  Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[19]  Kim-Kwang Raymond Choo,et al.  An integrated conceptual digital forensic framework for cloud computing , 2012, Digit. Investig..

[20]  Richard Morrell,et al.  Cloud computing: new challenges and opportunities , 2011, Netw. Secur..

[21]  Ali Dehghantanha,et al.  VoIP evidence model: A new forensic method for investigating VoIP malicious attacks , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[22]  Chris Wren,et al.  Cloud computing: Forensic challenges for law enforcement , 2010, 2010 International Conference for Internet Technology and Secured Transactions.

[23]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[24]  Hong Guo,et al.  Forensic investigations in Cloud environments , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).

[25]  Ali Dehghantanha,et al.  A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS , 2014 .

[26]  Jooyoung Lee,et al.  Pervasive Forensic Analysis Based on Mobile Cloud Computing , 2011, 2011 Third International Conference on Multimedia Information Networking and Security.

[27]  Christoph Wegener,et al.  Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[28]  Stephen Mason,et al.  Digital evidence and 'cloud' computing , 2011, Comput. Law Secur. Rev..

[29]  Kirit J. Modi,et al.  Cloud computing - concepts, architecture and challenges , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[30]  Roger Clarke,et al.  Privacy and consumer risks in cloud computing , 2010, Comput. Law Secur. Rev..

[31]  Ali Dehghantanha,et al.  User-centered Privacy and Trust Model in Cloud Computing Systems , 2009 .

[32]  Ali Dehghantanha,et al.  Defusing the Hazards of Social Network Services , 2011 .

[33]  Ali Dehghantanha,et al.  Investigation of bypassing malware defences and malware detections , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[34]  Nur Izura Udzir,et al.  A XML based, user-centered privacy model in pervasivecomputing systems , 2009 .

[35]  Farid Daryabar,et al.  INVESTIGATION OF MALWARE DEFENCE AND DETECTION TECHNIQUES , 2011 .

[36]  SeyedHossein Mohtasebi,et al.  SMARTPHONE FORENSICS: A CASE STUDY WITH NOKIA E5-00 MOBILE PHONE , 2011 .

[37]  Hiroyuki Sato,et al.  A Cloud Trust Model in a Security Aware Cloud , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.

[38]  Abha Belorkar,et al.  Regeneration of events using system snapshots for cloud forensic analysis , 2011, 2011 Annual IEEE India Conference.

[39]  ChengYan Cybercrime forensic system in cloud computing , 2011 .

[40]  Ali Dehghantanha,et al.  Analysis of virtual honeynet and VLAN-based virtual networks , 2011, 2011 International Symposium on Humanities, Science and Engineering Research.

[41]  Gary C. Kessler,et al.  Anti-Forensics and the Digital Investigator , 2007 .

[42]  Ali Dehghantanha,et al.  A Framework of TPM, SVM and Boot Control for Securing Forensic Logs , 2012 .

[43]  Ali Dehghantanha,et al.  A User-Centered Context-Sensitive Privacy Model in Pervasive Systems , 2010, 2010 Second International Conference on Communication Software and Networks.

[44]  Tyler Moore The Economics of Digital Forensics , 2006, WEIS.

[45]  Hong Zhao,et al.  Data Security and Privacy Protection Issues in Cloud Computing , 2012, 2012 International Conference on Computer Science and Electronics Engineering.