Abstract
Identification of data which is stored in the cloud is complicated than what we expect and collection of evidence which is robust, tamper-proof and stands in the court of law is one of the most challenging aspects of the whole procedure. The data for which the whole process is being executed can be reserved on the data-centers, can be placed anywhere across the globe. Feasibility of accessing the data on the physical drive is much less when we see the scenario of cloud storage and processing. Case studies, guidelines and advisories till date majorly describes those traditional processes i.e maintaining chain of custody, search and seizure, etc. But the principle concern are gathering the data, integrity and reliability of the data that is to be analyzed after seizure and Formation of essential requirements like, Cloud Infrastructure, instances, services to run upon and most important—Client, for testing the procedure. Infrastructure to be used, compatibility issues, guidelines and advisories have been finalized to achieve the primary aspects that is: Assess the nobility and dependability of the extracted information that is not compromised, tampered.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shaunak Mody Security & Forensics Research Group, Auckland University of Technology. (2017). December) A centralised platform for digital forensic investigations in cloud-based environments. 15th Australian Digital Forensics Conference (pp. 5–6). Perth, Australia: Edith Cowan University.
Barrett, D., & Kipper, G. (2010). Virtualisation and forensics–A digital forensic investigator’s guide to virtual environments. In S. Liles (Ed.), Burlington. USA: Elsevier.
Almulla, S., Iraqi, Y., & Jones, A. (2014). A state-of-the-art review of cloud forensics. Journal of Digital Forensics, Security and Law, 9, 7–28.
Chantry, D. (2009, January). Mapping applications to the cloud. Retrieved August 28, 2014, from Microsoft Developer Network.
Mok, E., Samsudin, A., & Fun, T. (2017). Implementing the honey encryption for securing public cloud data storage.. https://doi.org/10.4108/eai.27-2-2017.152270.
Moussa, A. N., Ithnin, N., & Zainal, A. (2018). CFaaS: Bilaterally agreed evidence collection. Journal of Cloud Computing, 7, 1. https://doi.org/10.1186/s13677-017-0102-3.
Wenhai, S. (2018). Towards secure outsourced data services in the public cloud. Virginia Tech: Diss.
Alali, F. A., & Yeh, C. L. (2012). Cloud computing: Overview and risk analysis. Journal of Information Systems, 26(2), 13–33 (Amazon).
Buffington, J. (2014, June). Why store once federated duplication matters to HP—And should to you, too. In Enterprise Strategy Group.
Cuthbertson, S. (2013). Mutual assistance in criminal matters: Cyberworld realities. Cross-border law enforcement: Regional law enforcement cooperation-European, Australian and Asia Pacific perspectives, 2012, 127–142.
Liu, C., Singhal, A., & Wijesekera, D. (2015). A logic-based network forensic model for evidence analysis. In G. Peterson & S. Shenoi (Eds.), Advances in digital forensics XI (pp. 129–145). Heidelberg, Germany: Springer.
Liu, C., Singhal, A., & Wijesekara, D. (2016). A probabilistic network forensic model for evidence analysis. In G. Peterson & S. Shenoi (Eds.), Advances in digital forensics XII (pp. 189–210). Heidelberg, Germany: Springer.
Chunga, H., Parka, J., Leea, S., Kang, C., Chung, H., et al. (2012). Digital forensic investigation of cloud storage services. Digital Investigation, 9(2), 81–95.
Abdel Razek, S., El-Fiqi, H., & Mahmoud, I. (2017). Cloud storage forensics: Survey. International Journal of Engineering Trends and Technology (IJETT), V52(1), 22–35. ISSN:2231-5381.
Kesalkar, B., Bagade, D., Barsagade, M., Jakulwar, N., & Zade, S. Implementation of data deduplication using cloud computing. IJARIIT (ISSN: 2454-132X).
Gite, Y., Pawar, A., & Ghumbre, S. (2018). Efficient data backup technique for cloud storage. International Journal of Engineering Research in Computer Science and Engineering (IJERCSE), 5(3)
Birk, D. (2011). Technical challenges of forensic investigations in cloud computing environments.
Ademu, I. O., Imafidon, C. O., & Preston, D. S. (2011). A new approach of digital forensic model for digital forensic investigation. International Journal of Advanced Computer Science and Applications.
Kumar, V., & Garg, K. K. (2012). Migration of services to the cloud environment: Challenges and best practices. International Journal of Computer Applications, 55(1).
Bahaweres, R. B., Santoso, N. B., & Ningsih, A. S. (2017, January). Cloud based drive forensic and DDoS analysis on seafile as case study. In International Conference on Computing and Applied Informatics, 755(1).
Narayana Samy, G., Shanmugam, B., Maarop, N., Magalingam, P., Perumal, S., & Al-Bakri, S. (2018) Digital forensic challenges in the cloud computing environment, pp. 669–676. https://doi.org/10.1007/978-3-319-59427-9_69.
Mahmoud Nasreldin Ain Shams UniversityCairo, Egypt. (2017). Evidence acquisition in cloud forensics. In IEEE 4th International Conference on New Paradigms in Electronics & Information Technology, 2017-11-05 - 2017-11-08.
Jaware, A. P., & Borkar, N. R. (2016). Computer science and engineering. Amravati University INDIA. Implementation of a secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Transactions on Parallel and Distributed Systems, 27(2).
Ning, J., Cao, Z., Dong, X., Liang, K., Wei, L., & Choo, K. -K. R. (2018). CryptCloud+: Secure and expressive data access control for cloud storage. IEEE Transactions on Services Computing.
BeeGFS The Parallel Cluster File System. BeeGFS (2015).
Clarke, N., Tryfonas, T., & Dodge, R. (2012). Proceedings of the Seventh International Workshop on Digital Forensics and Incident Analysis (WDFIA 2012).
Cloud Security Alliance. (2013, February). Alliance, cloud sacurity. The notorious nine: Cloud computing top threats in 2013. Top Threats Working Group.
Contrail Consortium. (2014). Morin, Christine. Open computing infrastructures for elastic services: contrail approach. In Proceedings of the 5th International Workshop on Virtualization Technologies in Distributed Computing. ACM, 2011.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Srivastava, P., Choudhary, A. (2021). Evolving Evidence Gathering Process: Cloud Forensics. In: Tiwari, S., Suryani, E., Ng, A.K., Mishra, K.K., Singh, N. (eds) Proceedings of International Conference on Big Data, Machine Learning and their Applications. Lecture Notes in Networks and Systems, vol 150. Springer, Singapore. https://doi.org/10.1007/978-981-15-8377-3_20
Download citation
DOI: https://doi.org/10.1007/978-981-15-8377-3_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-8376-6
Online ISBN: 978-981-15-8377-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)