Isolating Instances in Cloud Forensics
The isolation of a computing environment is an integral part of a digital forensic process. Isolation helps prevent evidence contamination and possible tampering. This paper focuses on the process of isolating instances in cloud computing systems. Several conditions are specified to serve as a guide for the successful isolation of cloud instances. Also, the complications that can arise during a cloud forensic investigation are discussed.
KeywordsCloud forensics instances isolation
- 1.D. Barrett and T. King, Computer Networking Illuminated, Jones and Bartlett, Sudbury, Massachusetts, 2005.Google Scholar
- 2.S. Biggs and S. Vidalis, Cloud computing: The impact on digital forensic investigations, Proceedings of the International Conference on Internet Technology and Secured Transactions, pp. 1–6, 2009.Google Scholar
- 3.C. Binnig, D. Kossmann, T. Kraska and S. Loesing, How is the weather tomorrow? Towards a benchmark for the cloud, Proceedings of the Second International Workshop on Testing Database Systems, 2009.Google Scholar
- 7.F. Cohen, Digital Forensic Evidence Examination, ASP Press, Livermore, California, 2010.Google Scholar
- 8.I. Foster, Y. Zhao, I. Raicu and S. Lu, Cloud computing and grid computing 360-degree compared, Proceedings of the Grid Computing Environments Workshop, 2008.Google Scholar
- 9.M. Khosa (Ed.), Infrastructure Mandate for Change 1994-1999, Human Sciences Research Council, Pretoria, South Africa, 2001.Google Scholar
- 11.R. Lu, X. Lin, X. Liang and X. Shen, Secure provenance: The essential of bread and butter of data forensics in cloud computing, Proceedings of the Fifth ACM Symposium on Information, Computer and Communications Security, pp. 282–292, 2010.Google Scholar
- 13.P. Mell and T. Grance, The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-145, National Institute of Standards and Technology, Gaithersburg, Maryland, 2011.Google Scholar
- 14.Nimbula, Nimbula Director, Mountain View, California (nimbula.com/product).
- 15.Nitu, Configurability in SaaS (software as a service) applications, Proceedings of the Second India Software Engineering Conference, pp. 19–26, 2009.Google Scholar
- 16.Oxford University Press, Oxford Dictionaries, Oxford, United Kingdom (oxforddictionaries.com), 2012.
- 17.D. Ras and M. Olivier, Finding droplets in the cloud, in Advances in Digital Forensics VIII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 169–185, 2012.Google Scholar
- 18.G. Reese, Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, O’Reilly, Sebastopol, California, 2009.Google Scholar
- 20.Technical Working Group for Electronic Crime Scene Investigation, Electronic Crime Scene Investigation: A Guide for First Responders, NIJ Guide, NCJ 187736, U.S. Department of Justice, Washington, DC, 2001.Google Scholar
- 22.P. White (Ed.), Crime Scene to Court: The Essentials of Forensic Science, Royal Society of Chemistry, Cambridge, United Kingdom, 2010. Google Scholar