Cloud Forensics: Identifying the Major Issues and Challenges

  • Stavros Simou
  • Christos Kalloniatis
  • Evangelia Kavakli
  • Stefanos Gritzalis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8484)


One of the most important areas in the developing field of cloud computing is the way that investigators conduct researches in order to reveal the ways that a digital crime took place over the cloud. This area is known as cloud forensics. While great research on digital forensics has been carried out, the current digital forensic models and frameworks used to conduct a digital investigation don’t meet the requirements and standards demanded in cloud forensics due to the nature and characteristics of cloud computing. In parallel, issues and challenges faced in traditional forensics are different to the ones of cloud forensics. This paper addresses the issues of the cloud forensics challenges identified from review conducted in the respective area and moves to a new model assigning the aforementioned challenges to stages.


Cloud Computing Cloud Forensics Cloud Forensics Process Cloud Forensics Challenges Digital Forensics 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
  2. 2.
    IDC, Worldwide and Regional Public IT Cloud Services 2013 –2017 Forecast, (accessed November 2013)
  3. 3.
    FOXBusinessReport, Matt Egan. Cyber Crime Costs Global Economy Up to $500B a Year (July 22, 2013), (accessed November 2013)
  4. 4.
    Peter, M., Grance, T.: The NIST definition of cloud computing (draft)." NIST special publication 800.145: 7 (2011)Google Scholar
  5. 5.
    Palmer Gary, L.: A Road Map for Digital Forensic Research – report from the First Digital Forensic Research Workshop (DFRWS), Utica, New York, USA, August 2001. Technical Report DTR-T001-01, Digital Forensic Research Workshop, Utica, New York, USA (November 2001)Google Scholar
  6. 6.
    Mark, R., Carr, C., Gunsch, G.: An examination of digital forensic models. International Journal of Digital Evidence 1(3), 1–12 (2002)zbMATHGoogle Scholar
  7. 7.
    Brian, C., Spafford, E.H.: Getting physical with the digital investigation process. International Journal of Digital Evidence 2(2), 1–20 (2003)Google Scholar
  8. 8.
    Venansius, B., Tushabe, F.: The enhanced digital investigation process model. In: Proceedings of the Fourth Digital Forensic Research Workshop (2004)Google Scholar
  9. 9.
    Lang, B.N., Clark, J.G.: A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation 2(2), 147–167 (2005)CrossRefGoogle Scholar
  10. 10.
    Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response, pp. 800–886. NIST Special Publication (2006)Google Scholar
  11. 11.
    Rahayu, S.S., Yusof, R., Sahib, S.: Mapping process of digital forensic investigation framework. International Journal of Computer Science and Network Security 8(10), 163–169 (2008)Google Scholar
  12. 12.
    Cohen, F.B.: Fundamentals of digital forensic evidence. In: Handbook of Information and Communication Security, pp. 789–808. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  13. 13.
    Aleksandar, V., Venter, H.S.: Harmonized digital forensic investigation process model. In: Information Security for South Africa (ISSA). IEEE (2012)Google Scholar
  14. 14.
    Hong, G., Jin, B., Shang, T.: Forensic investigations in cloud environments. In: 2012 International Conference on Computer Science and Information Processing (CSIP). IEEE (2012)Google Scholar
  15. 15.
    Chen, G., Du, Y., Qin, P., Du, J.: Suggestions to digital forensics in Cloud computing ERA. In: 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC). IEEE (2012)Google Scholar
  16. 16.
    Ben, M., Choo, K.-K.R.: An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 9(2), 71–80 (2012)CrossRefGoogle Scholar
  17. 17.
    Mohsen, D., Dehghantanha, A., Mahmoud, R., Shamsuddin, S.B.: Forensics investigation challenges in cloud computing environments. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE (2012)Google Scholar
  18. 18.
    Shams, Z., Hasan, R.: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv preprint arXiv:1302.6312 (2013)Google Scholar
  19. 19.
    Dominik, B., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE). IEEE (2011)Google Scholar
  20. 20.
    George, G., Storer, T., Glisson, W.B.: Calm Before the Storm: The Challenges of Cloud. In: Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, p. 211 (2013)Google Scholar
  21. 21.
    Poisel, R., Tjoa, S.: Discussion on the challenges and opportunities of cloud forensics. In: Quirchmayr, G., Basl, J., You, I., Xu, L., Weippl, E. (eds.) CD-ARES 2012. LNCS, vol. 7465, pp. 593–608. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  22. 22.
    Zimmerman, S., Glavach, D.: Cyber Forensics in the Cloud. IAnewsletter 14.1 (Winter 2011)Google Scholar
  23. 23.
    George, S., Venter, H.S., Fogwill, T.: Digital forensic framework for a cloud environment (2012)Google Scholar
  24. 24.
    Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: An overview. Advances in Digital Forensics 7, 35–49 (2011)Google Scholar
  25. 25.
    Ting, S.: A Log Based Approach to Make Digital Forensics Easier on Cloud Computing. In: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA). IEEE (2013)Google Scholar
  26. 26.
    Shahrzad, Z., Benford, D.: Cloud Forensics: Concepts, Issues, and Challenges. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT). IEEE (2012)Google Scholar
  27. 27.
    Reilly, D., Wren, C., Berry, T.: Cloud computing: Pros and cons for computer forensic investigations. International Journal Multimedia and Image Processing (IJMIP) 1(1), 26–34 (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Stavros Simou
    • 1
  • Christos Kalloniatis
    • 1
  • Evangelia Kavakli
    • 1
  • Stefanos Gritzalis
    • 2
  1. 1.Cultural Informatics Laboratory, Department of Cultural Technology and CommunicationUniversity of the AegeanMytileneGreece
  2. 2.Information and Communication Systems Security Laboratory, Department of Information and Communications Systems EngineeringUniversity of the AegeanSamosGreece

Personalised recommendations