Abstract
The isolation of a computing environment is an integral part of a digital forensic process. Isolation helps prevent evidence contamination and possible tampering. This paper focuses on the process of isolating instances in cloud computing systems. Several conditions are specified to serve as a guide for the successful isolation of cloud instances. Also, the complications that can arise during a cloud forensic investigation are discussed.
Keywords
- Cloud forensics
- instances
- isolation
Chapter PDF
References
D. Barrett and T. King, Computer Networking Illuminated, Jones and Bartlett, Sudbury, Massachusetts, 2005.
S. Biggs and S. Vidalis, Cloud computing: The impact on digital forensic investigations, Proceedings of the International Conference on Internet Technology and Secured Transactions, pp. 1–6, 2009.
C. Binnig, D. Kossmann, T. Kraska and S. Loesing, How is the weather tomorrow? Towards a benchmark for the cloud, Proceedings of the Second International Workshop on Testing Database Systems, 2009.
M. Caloyannides, N. Memon and W. Venema, Digital forensics, IEEE Security and Privacy, vol. 7(2), pp. 16–17, 2009.
E. Casalicchio and S. Tucci, Static and dynamic scheduling algorithms for scalable web server farms, Proceedings of the Ninth Euromicro Workshop on Parallel and Distributed Processing, pp. 369–376, 2001.
R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina, Controlling data in the cloud: Outsourcing computation without outsourcing control, Proceedings of the ACM Workshop on Cloud Computing Security, pp. 85–90, 2009.
F. Cohen, Digital Forensic Evidence Examination, ASP Press, Livermore, California, 2010.
I. Foster, Y. Zhao, I. Raicu and S. Lu, Cloud computing and grid computing 360-degree compared, Proceedings of the Grid Computing Environments Workshop, 2008.
M. Khosa (Ed.), Infrastructure Mandate for Change 1994-1999, Human Sciences Research Council, Pretoria, South Africa, 2001.
N. Lim and A. Khoo, Forensics of computers and handheld devices: Identical or fraternal twins? Communications of the ACM, vol. 52(6), pp. 132–135, 2009.
R. Lu, X. Lin, X. Liang and X. Shen, Secure provenance: The essential of bread and butter of data forensics in cloud computing, Proceedings of the Fifth ACM Symposium on Information, Computer and Communications Security, pp. 282–292, 2010.
J. Lyle, A strategy for testing hardware write block devices, Digital Investigation, vol. 3(S), pp. S3–S9, 2006.
P. Mell and T. Grance, The NIST Definition of Cloud Computing, Recommendations of the National Institute of Standards and Technology, NIST Special Publication 800-145, National Institute of Standards and Technology, Gaithersburg, Maryland, 2011.
Nimbula, Nimbula Director, Mountain View, California ( nimbula.com/product ).
Nitu, Configurability in SaaS (software as a service) applications, Proceedings of the Second India Software Engineering Conference, pp. 19–26, 2009.
Oxford University Press, Oxford Dictionaries, Oxford, United Kingdom ( oxforddictionaries.com ), 2012.
D. Ras and M. Olivier, Finding droplets in the cloud, in Advances in Digital Forensics VIII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 169–185, 2012.
G. Reese, Cloud Application Architectures: Building Applications and Infrastructure in the Cloud, O’Reilly, Sebastopol, California, 2009.
K. Ruan, J. Carthy, M. Kechadi and M. Crosbie, Cloud forensics, in Advances in Digital Forensics VII, G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany, pp. 35–46, 2011.
Technical Working Group for Electronic Crime Scene Investigation, Electronic Crime Scene Investigation: A Guide for First Responders, NIJ Guide, NCJ 187736, U.S. Department of Justice, Washington, DC, 2001.
M. Vouk, Cloud computing – Issues, research and implementations, Proceedings of the Thirtieth International Conference on Information Technology Interfaces, pp. 31–40, 2008.
P. White (Ed.), Crime Scene to Court: The Essentials of Forensic Science, Royal Society of Chemistry, Cambridge, United Kingdom, 2010.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Delport, W., Olivier, M. (2012). Isolating Instances in Cloud Forensics. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics VIII. DigitalForensics 2012. IFIP Advances in Information and Communication Technology, vol 383. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33962-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-33962-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33961-5
Online ISBN: 978-3-642-33962-2
eBook Packages: Computer ScienceComputer Science (R0)