Digital Forensic Investigation Challenges based on Cloud Computing Characteristics

  • Authors

    • Ganthan Narayana Samy
    • Nurazean Maarop
    • Mohd Shahidan Abdullah
    • Sundresan Perum
    • Sameer Hasan Albakri
    • Bharanidharan Shanmugam
    • Premylla Jeremiah
    2018-10-07
    https://doi.org/10.14419/ijet.v7i4.15.21361
  • Cloud Computing Characteristics, Cloud Computing Forensics, Digital Forensics Challenges, Digital Forensics Processes.
  • One of the most popular computing technologies is cloud computing. There are many benefits in adopting cloud computing such as high-performance, flexibility and availability on-demand, more focused on the business objective and low-cost. However, the characteristics of the cloud computing environment have created many difficulties and challenges for digital forensic investigation processes. Therefore, this paper focuses on the digital forensic investigation challenges based on cloud computing characteristics.

     

     

  • References

    1. [1] Doherty, E., Carcary, M., & Conway, G. (2015). Migrating to the cloud: Examining the drivers and barriers to adoption of cloud computing by SMEs in Ireland: An exploratory study. Journal of Small Business and Enterprise Development, 22(3), 512-527.

      [2] Tabona, O., & Blyth, A. (2016). A forensic cloud environment to address the big data challenge in digital forensics. Proceedings of the SAI Computing Conference, pp. 579-584.

      [3] Yin, L. (2012). Study on computer forensics in cloud computing. Proceedings of the IEEE International Conference on Computer Science & Service System, pp. 1717-1719.

      [4] NIST Cloud Computing Forensic Science Working Group. (2014). NIST cloud computing forensic science challenges (Draft). NIST Interagency Report 8006.

      [5] Almulla, S. A., Iraqi, Y., & Jones, A. (2014). A state-of-the-art review of cloud forensics. Journal of Digital Forensics, Security and Law, 9(4), 7-28.

      [6] International Organization for Standardization (ISO). (2014). ISO/IEC 17788:2014 Information technology - Cloud computing - Overview and vocabulary. https://www.iso.org/obp/ui/#iso:std:iso-iec:17788:ed-1:v1:en.

      [7] Skene, J., Raimondi, F., & Emmerich, W. (2010). Service-level agreements for electronic services. IEEE Transactions on Software Engineering, 36(2), 288-304.

      [8] Alsubaih, A., Hafez, A., & Alghathbar, K. (2013). Authorization as a service in cloud environments. Proceedings of the IEEE Third International Conference on Cloud and Green Computing, pp. 487-493.

      [9] Yang, C. N., & Lai, J. B. (2013). Protecting data privacy and security for cloud computing based on secret sharing. Proceedings of the IEEE International Symposium on Biometrics and Security Technologies, pp. 259-266.

      [10] Samy, G. N., Shanmugam, B., Maarop, N., Magalingam, P., Perumal, S., & Albakri, S. H. (2017). Digital forensic challenges in the cloud computing environment. Proceedings of the International Conference of Reliable Information and Communication Technology, pp. 669-676.

      [11] Zawoad, S., & Hasan, R. (2013). Digital forensics in the cloud. http://www.dtic.mil/dtic/tr/fulltext/u2/a590911.pdf.

      [12] Barrett, D., & Kipper, G. (2010). Virtualization and forensics: A digital forensic investigator’s guide to virtual environments. Syngress.

      [13] Alex, M. E., & Kishore, R. (2016). Forensic model for cloud computing: an overview. Proceedings of the IEEE International Conference on Wireless Communications, Signal Processing and Networking, pp. 1291-1295.

      [14] Alqahtany, S., Clarke, N., Furnell, S., & Reich, C. (2015). Cloud forensics: a review of challenges, solutions and open problems. Proceedings of the IEEE International Conference on Cloud Computing, pp. 1-9.

      [15] Garfinkel, S. L. (2010). Digital forensics research: The next 10 years. Digital Investigation, 7, S64-S73.

      [16] Albakri, S. H., Shanmugam, B., Samy, G. N., Idris, N. B., & Ahmed, A. (2014). Security risk assessment framework for cloud computing environments. Security and Communication Networks, 7(11), 2114-2124.

      [17] Decker, M. J., Kruse, W., Long, B., & Kelly, G. (2011). Dispelling common myths of live digital forensics. http://dfcb.org/wp-content/uploads/2018/05/myth-of-live-forensics.pdf.

      [18] Ruan, K. (2013). Cybercrime and cloud forensics: Applications for investigation. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.394.7732&rep=rep1&type=pdf.

      [19] Ruan, K., & Carthy, J. (2012). Cloud forensic maturity model. Proceedings of the International Conference on Digital Forensics and Cyber Crime, pp. 22-41.

      [20] Pătraşcu, A., & Patriciu, V. V. (2013). Beyond digital forensics. A cloud computing perspective over incident response and reporting. Proceedings of the IEEE 8th International Symposium on Applied Computational Intelligence and Informatics, pp. 455-460.

  • Downloads

  • How to Cite

    Narayana Samy, G., Maarop, N., Shahidan Abdullah, M., Perum, S., Hasan Albakri, S., Shanmugam, B., & Jeremiah, P. (2018). Digital Forensic Investigation Challenges based on Cloud Computing Characteristics. International Journal of Engineering & Technology, 7(4.15), 7-11. https://doi.org/10.14419/ijet.v7i4.15.21361