Abstract
One of the most important areas in the developing field of cloud computing is the way that investigators conduct researches in order to reveal the ways that a digital crime took place over the cloud. This area is known as cloud forensics. While great research on digital forensics has been carried out, the current digital forensic models and frameworks used to conduct a digital investigation don’t meet the requirements and standards demanded in cloud forensics due to the nature and characteristics of cloud computing. In parallel, issues and challenges faced in traditional forensics are different to the ones of cloud forensics. This paper addresses the issues of the cloud forensics challenges identified from review conducted in the respective area and moves to a new model assigning the aforementioned challenges to stages.
Chapter PDF
Similar content being viewed by others
Keywords
References
http://www.mjskok.com/resource/2013-future-cloud-computing-3rd-annual-survey-results (accessed November 2013)
IDC, Worldwide and Regional Public IT Cloud Services 2013 –2017 Forecast, http://www.idc.com/getdoc.jsp?containerId=242464 (accessed November 2013)
FOXBusinessReport, Matt Egan. Cyber Crime Costs Global Economy Up to $500B a Year (July 22, 2013), http://www.foxbusiness.com/technology/2013/07/22/report-cyber-crime-costs-global-economy-up-to-1-trillion-year/ (accessed November 2013)
Peter, M., Grance, T.: The NIST definition of cloud computing (draft)." NIST special publication 800.145: 7 (2011)
Palmer Gary, L.: A Road Map for Digital Forensic Research – report from the First Digital Forensic Research Workshop (DFRWS), Utica, New York, USA, August 2001. Technical Report DTR-T001-01, Digital Forensic Research Workshop, Utica, New York, USA (November 2001)
Mark, R., Carr, C., Gunsch, G.: An examination of digital forensic models. International Journal of Digital Evidence 1(3), 1–12 (2002)
Brian, C., Spafford, E.H.: Getting physical with the digital investigation process. International Journal of Digital Evidence 2(2), 1–20 (2003)
Venansius, B., Tushabe, F.: The enhanced digital investigation process model. In: Proceedings of the Fourth Digital Forensic Research Workshop (2004)
Lang, B.N., Clark, J.G.: A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation 2(2), 147–167 (2005)
Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response, pp. 800–886. NIST Special Publication (2006)
Rahayu, S.S., Yusof, R., Sahib, S.: Mapping process of digital forensic investigation framework. International Journal of Computer Science and Network Security 8(10), 163–169 (2008)
Cohen, F.B.: Fundamentals of digital forensic evidence. In: Handbook of Information and Communication Security, pp. 789–808. Springer, Heidelberg (2010)
Aleksandar, V., Venter, H.S.: Harmonized digital forensic investigation process model. In: Information Security for South Africa (ISSA). IEEE (2012)
Hong, G., Jin, B., Shang, T.: Forensic investigations in cloud environments. In: 2012 International Conference on Computer Science and Information Processing (CSIP). IEEE (2012)
Chen, G., Du, Y., Qin, P., Du, J.: Suggestions to digital forensics in Cloud computing ERA. In: 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC). IEEE (2012)
Ben, M., Choo, K.-K.R.: An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 9(2), 71–80 (2012)
Mohsen, D., Dehghantanha, A., Mahmoud, R., Shamsuddin, S.B.: Forensics investigation challenges in cloud computing environments. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE (2012)
Shams, Z., Hasan, R.: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv preprint arXiv:1302.6312 (2013)
Dominik, B., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE (2011)
George, G., Storer, T., Glisson, W.B.: Calm Before the Storm: The Challenges of Cloud. In: Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, p. 211 (2013)
Poisel, R., Tjoa, S.: Discussion on the challenges and opportunities of cloud forensics. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 593–608. Springer, Heidelberg (2012)
Zimmerman, S., Glavach, D.: Cyber Forensics in the Cloud. IAnewsletter 14.1 (Winter 2011)
George, S., Venter, H.S., Fogwill, T.: Digital forensic framework for a cloud environment (2012)
Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: An overview. Advances in Digital Forensics 7, 35–49 (2011)
Ting, S.: A Log Based Approach to Make Digital Forensics Easier on Cloud Computing. In: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA). IEEE (2013)
Shahrzad, Z., Benford, D.: Cloud Forensics: Concepts, Issues, and Challenges. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE (2012)
Reilly, D., Wren, C., Berry, T.: Cloud computing: Pros and cons for computer forensic investigations. International Journal Multimedia and Image Processing (IJMIP) 1(1), 26–34 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S. (2014). Cloud Forensics: Identifying the Major Issues and Challenges. In: Jarke, M., et al. Advanced Information Systems Engineering. CAiSE 2014. Lecture Notes in Computer Science, vol 8484. Springer, Cham. https://doi.org/10.1007/978-3-319-07881-6_19
Download citation
DOI: https://doi.org/10.1007/978-3-319-07881-6_19
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07880-9
Online ISBN: 978-3-319-07881-6
eBook Packages: Computer ScienceComputer Science (R0)