Legal Process and Requirements for Cloud Forensic Investigations

For the emerging field of cloud forensics, the development of validated and repeatable scientific processes for conducting cloud forensic investigations should include requirements that establish evidence collected as legally admissible. There is currently an uncertainty in the legal requirements for cloud forensics. Forensic investigations in the cloud introduce unique issues that must be addressed, and the legal environment of the cloud must be considered. The authors will detail the process in criminal cloud forensic investigations for commanding production from cloud providers including constitutional and statutory limitations, and the civil and criminal admissibility processes. Decisions in court cases rely on the authenticity and reliability of the evidence presented. Ensuring cases involving cloud forensics follow the proper legal process and requirements will be beneficial for validating evidence when presented in court. Further, understanding of legal requirements will aid in the research and development of cloud forensics tools to aid investigations.

[1]  Vasilios Katos,et al.  Requirements for a Forensically Ready Cloud Storage Service , 2011, Int. J. Digit. Crime Forensics.

[2]  Stephen D. Wolthusen,et al.  Overcast: Forensic Discovery in Cloud Environments , 2009, 2009 Fifth International Conference on IT Security Incident Management and IT Forensics.

[3]  Tahar Kechadi,et al.  Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis , 2011 .

[4]  Alan T. Sherman,et al.  Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques , 2012, Digit. Investig..

[5]  Bernd Grobauer,et al.  Towards incident handling in the cloud: challenges and approaches , 2010, CCSW '10.

[6]  Stephen Biggs,et al.  Cloud Computing: The impact on digital forensic investigations , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[7]  Roderic Broadhurst,et al.  Developments in the global law enforcement of cyber‐crime , 2006 .

[8]  Marcus K. Rogers,et al.  A Survey of the Legal Issues Facing Digital Forensic Experts , 2009, IFIP Int. Conf. Digital Forensics.

[9]  Michael Losavio The law of possession of digital objects: dominion and control issues for digital forensics investigations and prosecutions , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).

[10]  Abbes Amira,et al.  Mobile Video Cloud Networks , 2014 .

[11]  Wayne R. LaFave Search and seizure : a treatise on the fourth amendment , 1980 .

[12]  Wolfgang Frey,et al.  Synthesis of an Optically Active Decahydro-6-isoquinolone Scaffold with a Quaternary Stereocenter , 2004 .

[13]  Christoph Wegener,et al.  Technical Issues of Forensic Investigations in Cloud Computing Environments , 2011, 2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering.

[14]  David A. Couillard Defogging the Cloud: Applying Fourth Amendment Principles to Evolving Privacy Expectations in Cloud Computing , 2009 .

[15]  Thomas Kappeler,et al.  A note on gaps of Hill's equation , 2004 .

[16]  Fawzy Soliman,et al.  Sustainable Business Transformation in Supply Chains , 2014, Web Services.

[17]  E. Alvord,et al.  Pathology of Tumours of the Nervous System, Ed. 4, Dorothy S. Russell, Lucien J. Rubinstein. The Williams & Wilkins Co., Baltimore (1977), 331 illustrations, 448 pages. $50.00. , 1978 .

[18]  Orin S. Kerr The Case for the Third-Party Doctrine , 2008 .

[19]  Taesung Park,et al.  Testing for ordered group effects with repeated measurements , 1996 .

[20]  N. Brody,et al.  Of what are we aware? , 1994, Behavioral and Brain Sciences.

[21]  Margaret A. Berger,et al.  Weinstein's Evidence: Commentary on Rules of Evidence for the United States Courts and Magistrates (& Supp., 1975- ) , 1975 .

[22]  F S Cohen,et al.  Methodologies in the study of cell-cell fusion. , 1998, Methods.

[23]  Joel J. P. C. Rodrigues,et al.  Mobile Networks and Cloud Computing Convergence for Progressive Services and Applications , 2013 .

[24]  Paul R. Rice Electronic Evidence: Law and Practice , 2005 .

[25]  Barbara Endicott-Popovsky,et al.  On the Creation of Reliable Digital Evidence , 2012, IFIP Int. Conf. Digital Forensics.

[26]  Barbara Endicott-Popovsky,et al.  Digital Evidence Education in Schools of Law , 2012, J. Digit. Forensics Secur. Law.

[27]  H. Marshall Jarrett,et al.  Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations , 1979 .

[28]  M P Davis,et al.  There and back again. Lung cancer screening. , 1997, Chest.

[29]  Barbara Endicott-Popovsky,et al.  Unintended Consequences: Digital Evidence in Our Legal System , 2012, IEEE Security & Privacy.

[30]  ChengYan Cybercrime forensic system in cloud computing , 2011 .

[31]  R. F. Murphy Radioimmunoassay in Clinical Biochemistry , 1977 .

[32]  William Jeremy Robison,et al.  Free at What Cost? Cloud Computing Privacy Under the Stored Communications Act , 2010 .

[33]  Mark John Taylor,et al.  Forensic investigation of cloud computing systems , 2011, Netw. Secur..

[34]  F. Grosse,et al.  Accuracy of DNA polymerase‐alpha in copying natural DNA. , 1983, The EMBO journal.

[35]  Orin S. Kerr Applying the Fourth Amendment to the Internet: A General Approach , 2009 .

[36]  Mark Taylor,et al.  Digital evidence in cloud computing systems , 2010, Comput. Law Secur. Rev..

[37]  Mark Pollitt,et al.  Digital Forensics: Operational, Legal, and Research Issues , 2003, DBSec.