Abstract
Cloud computing technology attracted many Internet users and organizations the past few years and has become one of the hottest topics in IT. However, due to the newly appeared threats and challenges arisen in cloud computing, current methodologies and techniques are not designed for assisting the respective forensic processes in cloud environments. Challenges and issues introduced, require new solutions in cloud forensics. To date, the research conducted in this area concerns mostly the identification of the major challenges in cloud forensics. This paper focuses on the identification of the available technical solutions addressed in the respective literature that have an applicability on cloud computing. Furthermore it matches the identified solutions with the respective challenges already mentioned in the respective literature. Specifically, it summarizes the methods and the proposed solutions used to conduct an investigation, in comparison to the respective cloud challenges and finally it highlights the open problems in the area of cloud forensics.
Keywords
- Cloud Computing
- Cloud Forensics
- Cloud Forensics Challenges
- Cloud Forensics Solutions
- Review
Chapter PDF
References
Dominik, B., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE) 2011. IEEE (2011)
Shams, Z., Hasan, R.: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv preprint arXiv:1302.6312 (2013)
George, G., Storer, T., Glisson, W.B.: Calm Before the Storm: The Challenges of Cloud. Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, p. 211 (2013)
Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: An overview. Advances in Digital Forensics 7, 35–49 (2011)
Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud Forensics: Identifying the Major Issues and Challenges. In: Jarke, M., Mylopoulos, J., Quix, C. (eds.) CAiSE 2014 26th International Conference on Advanced Information Systems Engineering. LNCS, Springer, Heidelberg (June 2014)
Ting, S.: A Log Based Approach to Make Digital Forensics Easier on Cloud Computing. In: 2013 Third International Conference on Intelligent System Design and Engineering Applications (ISDEA). IEEE (2013)
Marty, R.: Cloud application logging for forensics. In: Proceedings of the 2011 ACM Symposium on Applied Computing. ACM (2011)
Mohsen, D., Dehghantanha, A., Mahmoud, R., Shamsuddin, S.B.: Forensics investigation challenges in cloud computing environments. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec). IEEE (2012)
Zafarullah, Z.,Anwar, F., Anwar, Z.: Digital forensics for eucalyptus. In: Frontiers of Information Technology (FIT). IEEE (2011)
Biggs, S., Vidalis, S.: Cloud computing: The impact on digital forensic investigations. In: International Conference for Internet Technology and Secured Transactions, ICITST 2009. IEEE (2009)
George, S., Venter, H.S., Fogwill, T.: Digital forensic framework for a cloud environment (2012)
Haeberlen, A.: A case for the accountable cloud. ACM SIGOPS Operating Systems Review 44(2), 52–57 (2010)
Ko, R.K., et al.: TrustCloud: A framework for accountability and trust in cloud computing. In: 2011 IEEE World Congress on Services (SERVICES). IEEE (2011)
Nurmi, D., et al.: The eucalyptus open-source cloud-computing system. In: 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGRID 2009. IEEE (2009)
Dykstra, J., Sherman, A.T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation 9, S90–S98 (2012)
Hegarty, R., et al.: Forensic analysis of distributed data in a service oriented computing platform. In: Proceedings of the 10th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting, PG Net (2009)
Shi, Y., Zhang, K., Li, Q.: A new data integrity verification mechanism for SaaS. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) WISM 2010. LNCS, vol. 6318, pp. 236–243. Springer, Heidelberg (2010)
Yan, C.: Cybercrime forensic system in cloud computing. In: 2011 International Conference on Image Analysis and Signal Processing (IASP). IEEE (2011)
Juels, A., Kaliski Jr., B.S.: PORs: Proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. ACM (2007)
Chen, G., Du, Y., Qin, P., Du, J.: Suggestions to digital forensics in Cloud computing ERA. In: 2012 3rd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC). IEEE (2012)
Dykstra, J., Sherman, A.T.: Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digital Investigation 10, S87-S95 (2013)
Wolthusen, S.D.: Overcast: Forensic discovery in cloud environments. In: Fifth International Conference on IT Security Incident Management and IT Forensics, IMF 2009. IEEE (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S. (2014). Cloud Forensics Solutions: A Review. In: Iliadis, L., Papazoglou, M., Pohl, K. (eds) Advanced Information Systems Engineering Workshops. CAiSE 2014. Lecture Notes in Business Information Processing, vol 178. Springer, Cham. https://doi.org/10.1007/978-3-319-07869-4_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-07869-4_28
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07868-7
Online ISBN: 978-3-319-07869-4
eBook Packages: Computer ScienceComputer Science (R0)