Isolating Instances in Cloud Forensics

The isolation of a computing environment is an integral part of a digital forensic process. Isolation helps prevent evidence contamination and possible tampering. This paper focuses on the process of isolating instances in cloud computing systems. Several conditions are specified to serve as a guide for the successful isolation of cloud instances. Also, the complications that can arise during a cloud forensic investigation are discussed.

[1]  Xiaohui Liang,et al.  Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.

[2]  F. Cohen Digital Forensic Evidence Examination , 2009 .

[3]  Sujeet Shenoi,et al.  Advances in Digital Forensics VIII , 2012, IFIP Advances in Information and Communication Technology.

[4]  Nena Lim,et al.  Forensics of computers and handheld devices: identical or fraternal twins? , 2009, CACM.

[5]  Martin S. Olivier,et al.  Finding File Fragments in the Cloud , 2012, IFIP Int. Conf. Digital Forensics.

[6]  Rini Mahajan,et al.  Cloud Computing Issues , 2005 .

[7]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[8]  Richard E. Overill,et al.  Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations , 2011, IFIP Int. Conf. Digital Forensics.

[9]  Stephen Biggs,et al.  Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[10]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[11]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[12]  Carsten Binnig,et al.  How is the weather tomorrow?: towards a benchmark for the cloud , 2009, DBTest '09.

[13]  Emiliano Casalicchio,et al.  Static and dynamic scheduling algorithms for scalable Web server farm , 2001, Proceedings Ninth Euromicro Workshop on Parallel and Distributed Processing.

[14]  James R. Lyle,et al.  A strategy for testing hardware write block devices , 2006, Digit. Investig..

[15]  George Reese,et al.  Cloud Application Architectures - Building Applications and Infrastructure in the Cloud , 2009 .

[16]  Diane Barrett Computer Networking Illuminated , 2005 .

[17]  Mohand Tahar Kechadi,et al.  Cloud Forensics , 2011, IFIP Int. Conf. Digital Forensics.

[18]  Mladen A. Vouk,et al.  Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.

[19]  Nitu,et al.  Configurability in SaaS (software as a service) applications , 2009, ISEC '09.

[20]  Nasir D. Memon,et al.  Digital Forensics , 2009, IEEE Secur. Priv..