A Survey of Cloud Computing Challenges from a Digital Forensics Perspective

Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users' concerns away from the physical location of system components and toward the accessibility of the system's services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.

[1]  Eduardo Cerqueira,et al.  Recent Advances and Challenges in Wireless QoE-Aware Multimedia Streaming Systems , 2012 .

[2]  Chunxiao Xing,et al.  A Service Component Model and Implementation for Institutional Repositories , 2012 .

[3]  Tevfik Kosar Data Intensive Distributed Computing: Challenges and Solutions for Large-scale Information Management , 2012 .

[4]  John W. Rittinghouse,et al.  Cloud Computing: Implementation, Management, and Security , 2009 .

[5]  Ann Chervenak,et al.  Replica Management in Data Intensive Distributed Science Applications , 2012 .

[6]  Mervi Hasu Blind Men and the Elephant , 2000 .

[7]  Somprakash Bandyopadhyay,et al.  Testbed Implementation of a Pollution Monitoring System Using Wireless Sensor Network for the Protection of Public Spaces , 2009, Int. J. Bus. Data Commun. Netw..

[8]  Evon M. O. Abu-Taieh,et al.  Handbook of Research on Discrete Event Simulation Environments: Technologies and Applications , 2009 .

[9]  Gianluca Cornetta,et al.  Wireless Radio-Frequency Standards and System Design: Advanced Techniques , 2012 .

[10]  Douglas Thain,et al.  Towards Data Intensive Many-Task Computing , 2012 .

[11]  Alexandros Stamatakis,et al.  Large-Scale Co-Phylogenetic Analysis on the Grid , 2009, Int. J. Grid High Perform. Comput..

[12]  Ben Coaker,et al.  An Evaluation of U.S. City Government Wireless Networks for Mobile Internet Access , 2009 .

[13]  Gregory H. Carlton An Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh , 2008, J. Digit. Forensics Secur. Law.

[14]  Samir Chatterjee,et al.  International Journal of Business Data Communications and Networking , 2010 .

[15]  Jih-Sheng Shen,et al.  Dynamic Reconfigurable Network-on-Chip Design - Innovations for Computational Processing and Communication , 2010 .

[16]  Ciprian Dobre,et al.  Architectures for Large Scale Distributed Systems , 2010 .

[17]  Kentaro Go,et al.  The blind men and the elephant: views of scenario-based system design , 2004, INTR.

[18]  Yogesh K. Dwivedi Consumer Adoption and Usage of Broadband , 2007 .

[19]  Gábor Hosszú,et al.  Fairness Analysis and Improvement of Transport Layer Protocols , 2009, Int. J. Bus. Data Commun. Netw..

[20]  Debashis Saha,et al.  Recent Advances in Broadband Integrated Network Operations and Services Management , 2011 .

[21]  Nurul I. Sarkar,et al.  Modeling and Simulation of IEEE 802.11g using OMNeT , 2010 .

[22]  Nik Bessis Development of Distributed Systems from Design to Application and Maintenance , 2012 .

[23]  Jukka Riekki,et al.  Cloud Architecture for Dynamic Service Composition , 2012, Int. J. Grid High Perform. Comput..

[24]  Yul Chu,et al.  A Buffered Dual-Access-Mode Scheme Designed for Low-Power Highly-Associative Caches , 2013, Int. J. Embed. Real Time Commun. Syst..

[25]  Stijn Dekeyser,et al.  Guaranteeing Correctness for Collaboration on Documents Using an Optimal Locking Protocol , 2011, Int. J. Distributed Syst. Technol..

[26]  Terrence V. Lillard Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data , 2010 .

[27]  Kamal Dahbur,et al.  Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities , 2011, Int. J. Cloud Appl. Comput..

[28]  Franco Callegati,et al.  SIP Protocol for Supporting Grid Computing , 2010 .

[29]  Debashis Saha,et al.  Platform on Platform (PoP) Model for Meta-Networking: A New Paradigm for Networks of the Future , 2013, Int. J. Bus. Data Commun. Netw..

[30]  Gregory H. Carlton,et al.  A protocol for the forensic data acquisition of personal computer workstations , 2006 .

[31]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[32]  Mohammed Ghanbari,et al.  Application of Parametric Cost Estimation Model to Telecommunication Networks , 2009, Int. J. Interdiscip. Telecommun. Netw..

[33]  Shon Harris CISSP Certification All-in-One Exam Guide, Fourth Edition , 2002 .

[34]  Omar Shatnawi Testing-Effort Dependent Software Reliability Model for Distributed Systems , 2013, Int. J. Distributed Syst. Technol..

[35]  Pierre Kuonen,et al.  MaGate: An Interoperable, Decentralized and Modular High-Level Grid Scheduler , 2010, Int. J. Distributed Syst. Technol..

[36]  Ciprian Dobre,et al.  Large-Scale Distributed Computing and Applications: Models and Trends , 2010 .

[37]  Ryan Johnson,et al.  Mastering Windows Network Forensics and Investigation , 2007 .

[38]  Ching-Hsien Hsu,et al.  Cloud Computing Technology and Science , 2013, Int. J. Grid High Perform. Comput..

[39]  Izabella Lokshina Application of Extrinsic Information Transfer Charts to Anticipate Turbo Code Behavior , 2011, Int. J. Interdiscip. Telecommun. Netw..

[40]  Mary Jane Irwin,et al.  Reliability Aware Performance and Power Optimization in DVFS-Based On-Chip Networks , 2010 .

[41]  Álvaro Suárez Sarmiento,et al.  Multimedia Services and Streaming for Mobile Devices: Challenges and Innovations , 2011 .

[42]  Sharon S. Dawes,et al.  The Internet, the state library, and the implementation of statewide information policy: the case of the NYS GIS clearinghouse , 2001 .

[43]  Jen-Ya Wang,et al.  A Transformation Technique for Scheduling Broadcast Programs of Multiple-Item Queries , 2012, Int. J. Grid High Perform. Comput..

[44]  Michael R. Bartolacci,et al.  Advancements and Innovations in Wireless Communications and Network Technologies , 2012 .