Cloud forensics: Technical challenges, solutions and comparative analysis

被引:65
|
作者
Pichan, Ameer [1 ]
Lazarescu, Mihai [1 ]
Soh, Sie Teng [1 ]
机构
[1] Curtin Univ, Dept Comp, Perth, WA 6102, Australia
关键词
Cloud computing; Cloud forensics; Cloud service provider; Cloud customer; Digital forensics; Digital evidence; Service level agreement; Amazon EC2; TRUST; SERVICE; TOOLS;
D O I
10.1016/j.diin.2015.03.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is arguably one of the most significant advances in information technology (IT) services today. Several cloud service providers (CSPs) have offered services that have produced various transformative changes in computing activities and presented numerous promising technological and economic opportunities. However, many cloud customers remain reluctant to move their IT needs to the cloud, mainly due to their concerns on cloud security and the threat of the unknown. The CSPs indirectly escalate their concerns by not letting customers see what is behind virtual wall of their clouds that, among others, hinders digital investigations. In addition, jurisdiction, data duplication and multi-tenancy in cloud platform add to the challenge of locating, identifying and separating the suspected or compromised targets for digital forensics. Unfortunately, the existing approaches to evidence collection and recovery in a non-cloud (traditional) system are not practical as they rely on unrestricted access to the relevant system and user data; something that is not available in the cloud due its decentralized data processing. In this paper we systematically survey the forensic challenges in cloud computing and analyze their most recent solutions and developments. In particular, unlike the existing surveys on the topic, we describe the issues in cloud computing using the phases of traditional digital forensics as the base. For each phase of the digital forensic process, we have included a list of challenges and analysis of their possible solutions. Our description helps identifying the differences between the problems and solutions for non-cloud and cloud digital forensics. Further, the presentation is expected to help the investigators better understand the problems in cloud environment. More importantly, the paper also includes most recent development in cloud forensics produced by researchers, National Institute of Standards and Technology and Amazon. (C) 2015 Elsevier Ltd. All rights reserved.
引用
收藏
页码:38 / 57
页数:20
相关论文
共 50 条
  • [31] A Survey of Cloud Computing Challenges from a Digital Forensics Perspective
    Carlton, Gregory H.
    Zhou, Hill
    [J]. INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2011, 3 (04) : 1 - 16
  • [32] Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics
    Grispos, George
    Storer, Tim
    Glisson, William Bradley
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2012, 4 (02) : 28 - 48
  • [33] Scenario-Based Digital Forensics Challenges in Cloud Computing
    Lopez, Erik Miranda
    Moon, Seo Yeon
    Park, Jong Hyuk
    [J]. SYMMETRY-BASEL, 2016, 8 (10):
  • [34] Analysis of the Current State of Cloud Forensics The Evolving Nature of Digital Forensics
    Yankson, Benjamin
    Davis, Adam
    [J]. 2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [35] Technical Solutions to Nonproliferation Challenges
    Satkowiak, Lawrence
    [J]. NUCLEAR WEAPON ISSUES IN THE 21ST CENTURY, 2014, 1596 : 180 - 193
  • [36] Cloud RAN challenges and solutions
    Rajeev Agrawal
    Anand Bedekar
    Troels Kolding
    Vishnu Ram
    [J]. Annals of Telecommunications, 2017, 72 : 387 - 400
  • [37] Cloud RAN challenges and solutions
    Agrawal, Rajeev
    Bedekar, Anand
    Kolding, Troels
    Ram, Vishnu
    [J]. ANNALS OF TELECOMMUNICATIONS, 2017, 72 (7-8) : 387 - 400
  • [38] Interplanetary Networks: Architectural Analysis, Technical Challenges and Solutions Overview
    Araniti, Giuseppe
    Bisio, Igor
    De Sanctis, Mauro
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [39] An analysis of security challenges and their perspective solutions for cloud computing and IoT
    Muhammad, Muhammad Hassan Ghulam
    Alyas, Tahir
    Ahmad, Faraz
    Butt, Fatima Hassan
    Qazi, Wajahat Mahmood
    Saqib, Shazia
    [J]. EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2021, 8 (30) : 1 - 11
  • [40] Cloud Database Management System security challenges and solutions: an analysis
    Shweta Malhotra
    Mohammad Najmud Doja
    Bashir Alam
    Mansaf Alam
    [J]. CSI Transactions on ICT, 2016, 4 (2-4) : 199 - 207