A Study on Forensic Challenges in Cloud Computing Environments

M Usha

Abstract


Cloud Computing is the most familiar topics in recent Times. It represents many new technological and economical opportunities. Many customers remain reluctant to move their business IT infrastructure completely to the Cloud Environment.

 

The main problem of these existing customers is Cloud security and the unknown threat. Cloud Service Providers (CSP) encourages this by not allowing their customers to see what is behind their virtual curtain. This directs to fuel insecurity on the sides of both providers and customers. In Cloud Forensics, the lack of physical access to servers constitutes a completely new challenge for investigators. Because of the decentralized nature of data processing in the Cloud, traditional approaches to evidence collection and recovery are no longer practical.

This paper concentrates on the technical aspects of digital forensics in distributed Cloud environments. It contributes by assessing whether it is possible for the customer of Cloud computing services to perform a traditional digital investigation.


Keywords


Cloud Computing, Cloud Forensic, Computer Security, Cloud Service Provider (CSP).

References


“Cloud Computing: “Status and Prognosis”, in Journal of Object Technology, vol. 8, no. 1, January-February 2009, pp. 65-72 http:// www.jot.fm/issues/issue 2009 01/column4/.

Cloud Computing: pros and cons for Computer Forensic Investigations. Stephenson, P., Modeling of post incident root causes analysis, International Journal of Digital Evidence, Volume 2, No. 2, 2003.

http://cloudcomputing.blogspot.com/Cloud computing: adoption fears and strategic innovation opportunities.

J. Nicholas hoober and Richard Martin: “Demystifying the Cloud”, InformationWeek Research & Reports, Pp.30-37, June 23, 2008.

J. Nicholas Hoober: “Outages Force Cloud Computing Users To Rethink Tactics”, InformationWeek, August 16, 2008.

Chen, Y.J.Wang, L.C., “A Security Framework of Group Location-Based Mobile Applications in Cloud Computing”,International Conference on Parallel Processing Workshops, Pp.184-190, 2011.

R. Howard, R. Thomas, J. Burstein, and R. Bradescu, “Cyber Fraud Trends and Mitigation”, in the International Conference on Forensic Computer Science (ICoFCS), 2007.

J. H. M. Nogueira, “Ontology for Complex Mission Scenarios in Forensic Computing”, in the International Conference on Forensic Computer Science (ICoFCS), 2007. Available: http://dx.doi.

G. M. Nunes, “Instant Messaging Forensics”, in The International Conference on Forensic Computer Science (ICoFCS), 2008


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

.......................................................................................................................................................................................................................

ISSN  2279 – 0381 |  IST HOMEJOURNAL HOME | Copyright IST 2012-13

.......................................................................................................................................................................................................................