Cloud Forensics Solutions: A Review

  • Stavros Simou
  • Christos Kalloniatis
  • Evangelia Kavakli
  • Stefanos Gritzalis
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 178)


Cloud computing technology attracted many Internet users and organizations the past few years and has become one of the hottest topics in IT. However, due to the newly appeared threats and challenges arisen in cloud computing, current methodologies and techniques are not designed for assisting the respective forensic processes in cloud environments. Challenges and issues introduced, require new solutions in cloud forensics. To date, the research conducted in this area concerns mostly the identification of the major challenges in cloud forensics. This paper focuses on the identification of the available technical solutions addressed in the respective literature that have an applicability on cloud computing. Furthermore it matches the identified solutions with the respective challenges already mentioned in the respective literature. Specifically, it summarizes the methods and the proposed solutions used to conduct an investigation, in comparison to the respective cloud challenges and finally it highlights the open problems in the area of cloud forensics.


Cloud Computing Cloud Forensics Cloud Forensics Challenges Cloud Forensics Solutions Review 


  1. 1.
    Dominik, B., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) 2011. IEEE (2011)Google Scholar
  2. 2.
    Shams, Z., Hasan, R.: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv preprint arXiv:1302.6312 (2013)Google Scholar
  3. 3.
    George, G., Storer, T., Glisson, W.B.: Calm Before the Storm: The Challenges of Cloud. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, p. 211 (2013)Google Scholar
  4. 4.
    Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: An overview. Advances in Digital Forensics 7, 35–49 (2011)Google Scholar
  5. 5.
    Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud Forensics: Identifying the Major Issues and Challenges. In: Jarke, M., Mylopoulos, J., Quix, C. (eds.) CAiSE 2014 26th International Conference on Advanced Information Systems Engineering. LNCS, Springer, Heidelberg (June 2014)Google Scholar
  6. 6.
    Ting, S.: A Log Based Approach to Make Digital Forensics Easier on Cloud Computing. In: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA). IEEE (2013)Google Scholar
  7. 7.
    Marty, R.: Cloud application logging for forensics. In: Proceedings of the 2011 ACM Symposium on Applied Computing. ACM (2011)Google Scholar
  8. 8.
    Mohsen, D., Dehghantanha, A., Mahmoud, R., Shamsuddin, S.B.: Forensics investigation challenges in cloud computing environments. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE (2012)Google Scholar
  9. 9.
    Zafarullah, Z.,Anwar, F., Anwar, Z.: Digital forensics for eucalyptus. In: Frontiers of Information Technology (FIT). IEEE (2011)Google Scholar
  10. 10.
    Biggs, S., Vidalis, S.: Cloud computing: The impact on digital forensic investigations. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009. IEEE (2009)Google Scholar
  11. 11.
    George, S., Venter, H.S., Fogwill, T.: Digital forensic framework for a cloud environment (2012)Google Scholar
  12. 12.
    Haeberlen, A.: A case for the accountable cloud. ACM SIGOPS Operating Systems Review 44(2), 52–57 (2010)CrossRefGoogle Scholar
  13. 13.
    Ko, R.K., et al.: TrustCloud: A framework for accountability and trust in cloud computing. In: 2011 IEEE World Congress on Services (SERVICES). IEEE (2011)Google Scholar
  14. 14.
    Nurmi, D., et al.: The eucalyptus open-source cloud-computing system. In: 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGRID 2009. IEEE (2009)Google Scholar
  15. 15.
    Dykstra, J., Sherman, A.T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation 9, S90–S98 (2012)Google Scholar
  16. 16.
    Hegarty, R., et al.: Forensic analysis of distributed data in a service oriented computing platform. In: Proceedings of the 10th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting, PG Net (2009)Google Scholar
  17. 17.
    Shi, Y., Zhang, K., Li, Q.: A new data integrity verification mechanism for SaaS. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) WISM 2010. LNCS, vol. 6318, pp. 236–243. Springer, Heidelberg (2010)Google Scholar
  18. 18.
    Yan, C.: Cybercrime forensic system in cloud computing. In: 2011 International Conference on Image Analysis and Signal Processing (IASP). IEEE (2011)Google Scholar
  19. 19.
    Juels, A., Kaliski Jr., B.S.: PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM (2007)Google Scholar
  20. 20.
    Chen, G., Du, Y., Qin, P., Du, J.: Suggestions to digital forensics in Cloud computing ERA. In: 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC). IEEE (2012)Google Scholar
  21. 21.
    Dykstra, J., Sherman, A.T.: Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digital Investigation 10, S87-S95 (2013)Google Scholar
  22. 22.
    Wolthusen, S.D.: Overcast: Forensic discovery in cloud environments. In: Fifth International Conference on IT Security Incident Management and IT Forensics, IMF 2009. IEEE (2009)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Stavros Simou
    • 1
  • Christos Kalloniatis
    • 1
  • Evangelia Kavakli
    • 1
  • Stefanos Gritzalis
    • 2
  1. 1.Cultural Informatics Laboratory, Department of Cultural Technology and CommunicationUniversity of the AegeanMytileneGreece
  2. 2.Information and Communication Systems Security Laboratory, Department of Information and Communications Systems EngineeringUniversity of the AegeanSamosGreece

Personalised recommendations