Cloud computing is an emerging technology
that is being widely adopted throughout the world due to its ease-of-use.
Organizations of all types can use it without pre-requisites such as IT
infra-structure, technical skills, managerial overload, storage capacity,
processing power, and data recovery or privacy setup. It can be availed by all
clients as per their needs, expectations and budget. However, cloud computing
introduces new kinds of security vulnerabilities that need to be ad-dressed.
Traditional “Computer Forensics” deals with detection, preemption and
prevention of IT triggered frauds and crimes but it lacks the ability to deal
with cybercrimes pertaining to cloud computing environment. In this paper, we
focus on forensics issues in cloud computing, assess limitations of forensic
team and present the obstacles faced during investigation.
References
[1]
Jadeja, Y. and Modi, K. (2012) Cloud Computing-Concepts, Architecture and Challenges. 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), Kumaracoil, 21-22 March 2012, 877-880.
http://dx.doi.org/10.1109/icceet.2012.6203873
[2]
Xiao, Z., Song, W. and Chen, Q. (2013) Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment. IEEE Transactions on Parallel and Distributed Systems, 24, 1107-1117.
http://dx.doi.org/10.1109/TPDS.2012.283
[3]
Wang, C., Wang, Q., Ren, K., Cao, N. and Lou, W. (2012) Toward Secure and Dependable Storage Services in Cloud Computing. IEEE Transactions on Services Computing, 5, 220-232. http://dx.doi.org/10.1109/TSC.2011.24
[4]
Hashizume, K., Rosado, D.G., Fernández-Medina, E. and Fernandez, E.B. (2013) An Analysis of Security Issues for Cloud Computing. Journal of Internet Services and Applications, 4, 1. http://dx.doi.org/10.1186/1869-0238-4-5
[5]
Armbrust, M., Fox, A., Griffith, R., et al. (2009) Above the Clouds: A Berkeley View of Cloud Computing.
[6]
Rani, D.R. and Geethakumari, G. (2015) An Efficient Approach to Forensic Investigation in Cloud Using VM Snapshots. 2015 International Conference on Pervasive Computing (ICPC), Pune, 8-10 January 2015, 1-5.
http://dx.doi.org/10.1109/pervasive.2015.7087206
[7]
Morioka, E. and Sharbaf, M.S. (2015) Cloud Computing: Digital Forensic Solutions. 2015 12th International Conference on Information Technology-New Generations (ITNG), Las Vegas, 13-15 April 2015, 589-594.
[8]
Sindhu, K.K. and Meshram, B.B. (2012) Digital Forensic Investigation Tools and Procedures. International Journal of Computer Network and Information Security, 4, 39. http://dx.doi.org/10.5815/ijcnis.2012.04.05
[9]
Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Inácio, P.R. (2014) Security Issues in Cloud Environments: A Survey. International Journal of Information Security, 13, 113-170.
http://dx.doi.org/10.1007/s10207-013-0208-7
[10]
Damshenas, M., Dehghantanha, A., Mahmoud, R. and bin Shamsuddin, S. (2012) Forensics Investigation Challenges in Cloud Computing Environments. 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, 26-28 June 2012, 190-194.