Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 150))

Abstract

Identification of data which is stored in the cloud is complicated than what we expect and collection of evidence which is robust, tamper-proof and stands in the court of law is one of the most challenging aspects of the whole procedure. The data for which the whole process is being executed can be reserved on the data-centers, can be placed anywhere across the globe. Feasibility of accessing the data on the physical drive is much less when we see the scenario of cloud storage and processing. Case studies, guidelines and advisories till date majorly describes those traditional processes i.e maintaining chain of custody, search and seizure, etc. But the principle concern are gathering the data, integrity and reliability of the data that is to be analyzed after seizure and Formation of essential requirements like, Cloud Infrastructure, instances, services to run upon and most important—Client, for testing the procedure. Infrastructure to be used, compatibility issues, guidelines and advisories have been finalized to achieve the primary aspects that is: Assess the nobility and dependability of the extracted information that is not compromised, tampered.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shaunak Mody Security & Forensics Research Group, Auckland University of Technology. (2017). December) A centralised platform for digital forensic investigations in cloud-based environments. 15th Australian Digital Forensics Conference (pp. 5–6). Perth, Australia: Edith Cowan University.

    Google Scholar 

  2. Barrett, D., & Kipper, G. (2010). Virtualisation and forensics–A digital forensic investigator’s guide to virtual environments. In S. Liles (Ed.), Burlington. USA: Elsevier.

    Google Scholar 

  3. Almulla, S., Iraqi, Y., & Jones, A. (2014). A state-of-the-art review of cloud forensics. Journal of Digital Forensics, Security and Law, 9, 7–28.

    Google Scholar 

  4. Chantry, D. (2009, January). Mapping applications to the cloud. Retrieved August 28, 2014, from Microsoft Developer Network.

    Google Scholar 

  5. Mok, E., Samsudin, A., & Fun, T. (2017). Implementing the honey encryption for securing public cloud data storage.. https://doi.org/10.4108/eai.27-2-2017.152270.

  6. Moussa, A. N., Ithnin, N., & Zainal, A. (2018). CFaaS: Bilaterally agreed evidence collection. Journal of Cloud Computing, 7, 1. https://doi.org/10.1186/s13677-017-0102-3.

    Article  Google Scholar 

  7. Wenhai, S. (2018). Towards secure outsourced data services in the public cloud. Virginia Tech: Diss.

    Google Scholar 

  8. Alali, F. A., & Yeh, C. L. (2012). Cloud computing: Overview and risk analysis. Journal of Information Systems, 26(2), 13–33 (Amazon).

    Google Scholar 

  9. Buffington, J. (2014, June). Why store once federated duplication matters to HP—And should to you, too. In Enterprise Strategy Group.

    Google Scholar 

  10. Cuthbertson, S. (2013). Mutual assistance in criminal matters: Cyberworld realities. Cross-border law enforcement: Regional law enforcement cooperation-European, Australian and Asia Pacific perspectives, 2012, 127–142.

    Google Scholar 

  11. Liu, C., Singhal, A., & Wijesekera, D. (2015). A logic-based network forensic model for evidence analysis. In G. Peterson & S. Shenoi (Eds.), Advances in digital forensics XI (pp. 129–145). Heidelberg, Germany: Springer.

    Google Scholar 

  12. Liu, C., Singhal, A., & Wijesekara, D. (2016). A probabilistic network forensic model for evidence analysis. In G. Peterson & S. Shenoi (Eds.), Advances in digital forensics XII (pp. 189–210). Heidelberg, Germany: Springer.

    Google Scholar 

  13. Chunga, H., Parka, J., Leea, S., Kang, C., Chung, H., et al. (2012). Digital forensic investigation of cloud storage services. Digital Investigation, 9(2), 81–95.

    Article  Google Scholar 

  14. Abdel Razek, S., El-Fiqi, H., & Mahmoud, I. (2017). Cloud storage forensics: Survey. International Journal of Engineering Trends and Technology (IJETT), V52(1), 22–35. ISSN:2231-5381.

    Google Scholar 

  15. Kesalkar, B., Bagade, D., Barsagade, M., Jakulwar, N., & Zade, S. Implementation of data deduplication using cloud computing. IJARIIT (ISSN: 2454-132X).

    Google Scholar 

  16. Gite, Y., Pawar, A., & Ghumbre, S. (2018). Efficient data backup technique for cloud storage. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), 5(3)

    Google Scholar 

  17. Birk, D. (2011). Technical challenges of forensic investigations in cloud computing environments.

    Google Scholar 

  18. Ademu, I. O., Imafidon, C. O., & Preston, D. S. (2011). A new approach of digital forensic model for digital forensic investigation. International Journal of Advanced Computer Science and Applications.

    Google Scholar 

  19. Kumar, V., & Garg, K. K. (2012). Migration of services to the cloud environment: Challenges and best practices. International Journal of Computer Applications, 55(1).

    Google Scholar 

  20. Bahaweres, R. B., Santoso, N. B., & Ningsih, A. S. (2017, January). Cloud based drive forensic and DDoS analysis on seafile as case study. In International Conference on Computing and Applied Informatics, 755(1).

    Google Scholar 

  21. Narayana Samy, G., Shanmugam, B., Maarop, N., Magalingam, P., Perumal, S., & Al-Bakri, S. (2018) Digital forensic challenges in the cloud computing environment, pp. 669–676. https://doi.org/10.1007/978-3-319-59427-9_69.

  22. Mahmoud Nasreldin Ain Shams UniversityCairo, Egypt. (2017). Evidence acquisition in cloud forensics. In IEEE 4th International Conference on New Paradigms in Electronics & Information Technology, 2017-11-05 - 2017-11-08.

    Google Scholar 

  23. Jaware, A. P., & Borkar, N. R. (2016). Computer science and engineering. Amravati University INDIA. Implementation of a secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2).

    Google Scholar 

  24. Ning, J., Cao, Z., Dong, X., Liang, K., Wei, L., & Choo, K. -K. R. (2018). CryptCloud+: Secure and expressive data access control for cloud storage. IEEE Transactions on Services Computing.

    Google Scholar 

  25. BeeGFS The Parallel Cluster File System. BeeGFS (2015).

    Google Scholar 

  26. Clarke, N., Tryfonas, T., & Dodge, R. (2012). Proceedings of the Seventh International Workshop on Digital Forensics and Incident Analysis (WDFIA 2012).

    Google Scholar 

  27. Cloud Security Alliance. (2013, February). Alliance, cloud sacurity. The notorious nine: Cloud computing top threats in 2013. Top Threats Working Group.

    Google Scholar 

  28. Contrail Consortium. (2014). Morin, Christine. Open computing infrastructures for elastic services: contrail approach. In Proceedings of the 5th International Workshop on Virtualization Technologies in Distributed Computing. ACM, 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arjun Choudhary .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Srivastava, P., Choudhary, A. (2021). Evolving Evidence Gathering Process: Cloud Forensics. In: Tiwari, S., Suryani, E., Ng, A.K., Mishra, K.K., Singh, N. (eds) Proceedings of International Conference on Big Data, Machine Learning and their Applications. Lecture Notes in Networks and Systems, vol 150. Springer, Singapore. https://doi.org/10.1007/978-981-15-8377-3_20

Download citation

Publish with us

Policies and ethics