1 CLOUD COMPUTING Table of Contents Introduction................................................................................................................................2 Features of Cloud computing.....................................................................................................2 Types of cloud computing..........................................................................................................3 Challenges of digital forensic in cloud computing....................................................................4 Layers of cloud computing.........................................................................................................5 Digital forensic in SaaS service model......................................................................................6 Future improvement...................................................................................................................8 Conclusion..................................................................................................................................9 References................................................................................................................................11
2 CLOUD COMPUTING Introduction Cloudcomputingmaybereferredasrecentdevelopingmodelin thecaseof distributed computing. A cloud based infrastructure is normally virtual as well as distributed in accordance with the characteristics (Ab Rahman et al., 2016). Within the cloud based environments, the third party involves for managing various hardware as well as platforms and also software. It is the most motivating fact that all of the IT related operations that is networking, cryptography as well as more software forpublic services using in daily lives, all of these are introduced by this cloud computing. According to the context, from the previous period, the cloud computing has become more popular as having lots of applications (Alex & Kishore, 2017). But in the recent days, there happens something interest within the research area of this field as it helps to gather as well as share the information across the network or on geographical areas and using this operations, the IT experts can able to deliver the information to the customers. Thus, in the digital world, the cloud forensic has gained success in this field. In the case of the cloud forensics, the major aim is to find as well as preserve and also analyse the information on the computer system for searching the most valuable evidence (Alluri & Geethakumari, 2015). In this case, various modern virtualization technologies can be integrated with this cloud computing for monitoring the information across various datacentres (Alqahtany et al., 2015). According to this report, it has to deliberate types of cloud computing, various layers as well as challenges of digital forensic in this area and also recommendations for future improvements. Characteristics of Cloud computing Cloud computing is basically use of hardware as well as software which needs for delivering service through the network towards the client (Baig et al., 2017). Moreover, the
3 CLOUD COMPUTING cloud forensics may be mentioned as the methods actually for storing as well as collecting, identifying and also interpreting information which helps to present the potential evidence from the distributed computing systems (Chen et al., 2015). This cloud computing occurs not only in the huge network but also it spreads over the world. Few features of this cloud computing by which the physical computing has been changed and for that it helps to move the traditional vendors towards the cloud technology are enlisted below: Resource pooling Reliability Maintainability Scalability Virtualization High performance Independent of location Utilization of resources effectively Customized Types of cloud computing The cloud computing mainly delivers various facilities related to the IT field with the help of the Internet. For securing as well as protect the information safely, all of them need to deliver through the cloud depended specially on software (Chen, Takabi & Le-Khac, 2019). All of the services are kept within the cloud which belongs within the digital space. According to definition of cloud computing, it has been categorised in three different types which includes Private cloud, Public cloud and also Hybrid cloud. Private cloud– Being named as private cloud, the maintenance of this cloud happen by the organization and this cloud system is generally used for securing the information and other
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 CLOUD COMPUTING internal purposes (Du, Le-Khac & Scanlon, 2017). Butthe other kind of network bandwidth related issues are not solved by this private cloud. Public cloud– This public computing is mainly considered as the cloud computing in which third party providers are major point of source in account to deliver several facilities over the Internet. This type of cloud is mainly rent by various organizations from the cloud providers in accordance with their demand. Hybrid cloud– The hybrid cloud is basically the integration of public cloud as well as private cloud. This type of cloud is collected from various internal and external cloud. Challenges for digital forensic within cloud computing Actually within the collection phase, the challenges of the digital forensic are mainly detected and also it has been detected within such of the particular processes including identification, preservation and also acquisition. Accessing of the data logs– Being distributed in nature, the identification of the log files within the cloud computing is so much difficult (Esposito et al., 2016). Generally the identification of various log files within this cloud computing depends on the servicing models. Because in the case of SaaS and also PaaS, the identification method is not so easy due to the limited access but in another service model which is known as IaaS, this process is quite better. Within the cloud computing, there occurs seven number of layers as well as tiers in which each of the log files are generated (Feng, Dawam & Amin, 2017). Moreover, these log files are most valuable for the investigations in digital investigations. Therefore, if the customers want to specify the particular a log files, thus it is quite easy for finding that of the log files as decentralizing within the cloud computing and in this way, the customers are easily found the log files.
5 CLOUD COMPUTING Decentralization of the information centres– The dispersed characteristics of the cloud computing allows the data to be stored as well as handled and also spread all over various data centres and also physical machines that are generally globally circulated (Kebande & Venter, 2015). For decentralizing nature of the cloud computing, the data log files are distributed in various geographical locations. Also, the data are replicated to another servers for ensuring the redundancy of the information. Moreover, the distribution of the information is based on the performance of the data centres and also their availability. Absence of control within the system – Generally the cloud is one kind of network access which helps to share the resources and also the resources have virtual nature and for that, it is not easily accessible for the cloud based users to locate the exact location of the resources (Kebande & Venter, 2014). Only for the CSP, it is easy to known the physical location of each of the resources. But for the investigators as well as cloud users, they have not known the exact physical location of the resources and for that they cannot control the real system. Moreover, the investigators have faced lots of problems during the evidence acquisition (Khan et al., 2014). Within the cloud computing, the cloud users have an access of controlling all of the levels but they do not have any kind of knowledge about the physical location of the resources. Absence of customer awareness– The lack of the customers’ awareness is one of the biggest challenge within this cloud forensic. The CSP is one and only way in which all of the actions are easily controlled. But in the case of cloud users, they have a little interaction with the CSP. This lack of the transparency of CSP with the slight interactions may lead the problems regarding various forensic investigations within different service models.
6 CLOUD COMPUTING Layers of cloud computing Within the cloud technology, there occurs various layers which are interconnected with each other and belongs on previous layers (Lillis et al., 2016). Accordingly, the cloud computing has several layers which are considered as the service models within this cloud computing. Moreover, there involves mainly three diverse kinds of layers which belongs within this cloud computing. The service models includes Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and also Software as a Service (SaaS). Infrastructure as a Service (IaaS) – Within the cloud computing, the first service model or layer is the Infrastructure as a Service (IaaS) which is based on virtualization technology. Within this service model, the service providers delivers the virtual machines as services to the cloud users. According to the business related requirements, it helps to provide the appropriate permission to the cloud users for creating as well as discarding the virtual machines and also networks. Usually, the IaaS helps to remove the need for the cloud users for investing on the procurement as well as operated physical servers and other data storing systems. Platform as a Service (PaaS) – The PaaS that means the Platform as a Service is considered as the second layer within the cloud computing. Generally, in this serviced model, the customers have no accessibility of managing of the virtual servers (Martini & Choo, 2014). But they have accessibility of making of application within several programming language. Within this service model, the cloud users can host the programming language. Moreover, the management as well as maintenance of operating system or other kinds of hardware are completed by the service providers. Software as a Service (SaaS) – By employing this service model, the cloud user can create various software applications which are available from the perspective of cloud service
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 CLOUD COMPUTING provider. Generally, the cloud operators can make an interaction along with the applications of this service model by using a particular web browser (Morioka & Sharbaf, 2015). For an example, Google apps which is offered by the Google, email, CRM and others. Digital forensic in SaaS service model From different kinds of characteristics, there are so many challenges within this cloud computing. Moreover, most of the CSP do not give the proper forensic support to the cloud users through the API (Perumal, Norwawi & Raman, 2015). Thus, it needs to focus the designation of the cloud computing along with the digital forensic within this SaaS service model. Within this SaaS service model, there existing a relationship with the CSP as well as CSN and also CSC. Among three of these, the CSP and also CSN have their interface along with application but in the case of CSC, this only make an interaction with the application which is built on it (Simou et al., 2014). Moreover, the CSN provides the proper support to the CSP as the software developer as well as system integrator and also content provider etc. In addition to this, the relationship as well as role create an impact on the data collection method and access around the information in terms of the level of the service agreements. It has been analysed that if the CSC has examined that the belonging of the CSN is under the SaaS application. If it has been already occurred, therefore the CSC has understood that all of the information can be handled as well as stored by the CSN. This situation may lead to happen such practical issues as segregation of responsibilities as well as forensic acquisition, evidence segregation etc. and these issues are faced by the investigators and it is full control over the examination.
8 CLOUD COMPUTING Fig: Model for the cloudc forensic in SaaS application As per the SaaS maturity paradigm along with the environment of the SaaS service model, this model may be categorized within the four stages such as custom, configurable as well as multi-tenant and also mountable level. Every of the level has various features in terms independency as well as sharing and also scalability of the particular instance giving only SaaS application (Thethi & Keane, 2014). Various maturity models need various kinds of requirements related to the SaaS application for the collection of the digital evidence and also management regarding the technical implementation, operational policy etc. There belongs an advantage within this custom level regarding the implementation of the customized solution for only the data collection and also acquisition than the configurable level by using the general templates. In addition to this, for the cloud service providers, there exists the inter cloud pattern like inter cloud peering as well as federation etc. In the case of inter cloud peering, two number of the peer cloud service providers have made the interaction with each other. But in the case of the inter cloud federation, a number of peer cloud service providers involve in the model. In that case, these service providers combine with each other to provide various service capabilities to the CSC as per their requirements. These kind of patterns include split of the control over the information as well as multi jurisdiction and also data ownership
9 CLOUD COMPUTING within the procedures of the cloud computing. In this circumstance of the SaaS application, CSC is based on the cloud service supplier for receiving the application of the log or the information. Future improvement In the challenges part, it has been analysed that, in the cloud computing, the decentralization of the information occurs within this cloud computing and for that all of the cloud users can easily access the log files (Wang, Uehara & Sasaki, 2015). In that case, it must implement such security related model so that such confidentiality happens within these cloud users. The introduction of secure logging as a service (SecLaas) mechanism helps to allow the cloud service providers for storing the virtual machine logs and also gives the accessibility to the forensic investigators In the case of preservation of the confidentiality among the cloud users. Within the cloud computing, the challenging issues relates with the volatile data. For preventing the volatile data, there must implement with the data synchronization between the virtualmachineandthenon-cloudrelatedstorage.Becausewiththehelpofthe synchronization, the customer service providers can integrate it with each of the virtual machine and also it helps to preserve the information within the infrastructure. Within the cloud forensic, there was a challenge regarding the identification of the client. For preventing this issue and getting the identification of the client, it needs to implement as well as designation of an application for logging all of the potential evidence on side of client machine. For that, the client can easily access all of the evidence. But the cloud service providers do not provide the mechanism about the application as well as procedure of the cloud computing.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 CLOUD COMPUTING Conclusion It can be decided that the cloud computing is the most important technique in today’s world.Because the cloud computing is the accessibility of the resources regarding the computer systems particularly for the data storage. This mechanism is used for describing the data centers for various cloud users over Internet. In addition to this, the digital forensic is onekindofprocessbywhichthepreservationaswellasidentificationandalso documentation of the computer related evidence are possibly occurred. Moreover, there are different kinds of cloud within this cloud computing and different clouds are such as private cloud, public cloud and also hybrid cloud. These three of the clouds are too much important for the organizations as because the private cloud is used for the organization. Moreover, there are also several service providers which belong within this cloud computing and the service models are like IaaS, PaaS and SaaS. In this discussion, the digital forensic has explained within the implementation of the Software as a Service model (SaaS). Also, within this cloud computing, there belongs some of the challenges involving the lack of the control of system as well as volatile data, decentralization of the data centers etc. But these challenges must be solved by such provided recommendations. This discussion provides such recommendations which are beneficial for the future improvements.
11 CLOUD COMPUTING References Ab Rahman, N. H., Glisson, W. B., Yang, Y., & Choo, K. K. R. (2016). Forensic-by-design framework for cyber-physical cloud systems.IEEE Cloud Computing,3(1), 50-59. Alex, M. E., & Kishore, R. (2017). Forensics framework for cloud computing.Computers & Electrical Engineering,60, 193-205. Alluri, B. K. R., & Geethakumari, G. (2015, February). A digital forensic model for introspection of virtual machines in cloud computing. In2015 IEEE International Conference on Signal Processing, Informatics, Communication and Energy Systems (SPICES)(pp. 1-5). IEEE. Alqahtany, S., Clarke, N., Furnell, S., & Reich, C. (2015, April). Cloud forensics: a review of challenges, solutions and open problems. In2015 International Conference on Cloud Computing (ICCC)(pp. 1-9). IEEE. Baig, Z. A., Szewczyk, P., Valli, C., Rabadia, P., Hannay, P., Chernyshev, M., ... & Syed, N. (2017).Futurechallengesforsmartcities:Cyber-securityanddigital forensics.Digital Investigation,22, 3-13. Chen, L., Xu, L., Yuan, X., & Shashidhar, N. (2015, February). Digital forensics in social networks and the cloud: Process, approaches, methods, tools, and challenges. In2015 InternationalConferenceonComputing,NetworkingandCommunications (ICNC)(pp. 1132-1136). IEEE. Chen, L., Takabi, H., & Le-Khac, N. A. (Eds.). (2019).Security, Privacy, and Digital Forensics in the Cloud. John Wiley & Sons. Du, X., Le-Khac, N. A., & Scanlon, M. (2017). Evaluation of digital forensic process models with respect to digital forensics as a service.arXiv preprint arXiv:1708.01730.
12 CLOUD COMPUTING Esposito, C., Castiglione, A., Martini, B., & Choo, K. K. R. (2016). Cloud manufacturing: security, privacy, and forensic concerns.IEEE Cloud Computing,3(4), 16-22. Feng, X., Dawam, E. S., & Amin, S. (2017, June). A new digital forensics model of smart city automated vehicles. In2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber,PhysicalandSocialComputing(CPSCom)andIEEESmartData (SmartData)(pp. 274-279). IEEE. Kebande, V. R., & Venter, H. S. (2015, February). Obfuscating a cloud-based botnet towards digital forensic readiness. InIccws 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security(p. 434). Kebande, V. R., & Venter, H. S. (2014, June). A cloud forensic readiness model using a BotnetasaService.InTheInternationalConferenceonDigitalSecurityand Forensics (DigitalSec2014)(pp. 23-32). Ostrava: The Society of Digital Information and Wireless Communication. Khan, S., Ahmad, E., Shiraz, M., Gani, A., Wahab, A. W. A., & Bagiwa, M. A. (2014, September). Forensic challenges in mobile cloud computing. In2014 International Conference on Computer, Communications, and Control Technology (I4CT)(pp. 343- 347). IEEE. Lillis, D., Becker, B., O'Sullivan, T., & Scanlon, M. (2016). Current challenges and future research areas for digital forensic investigation.arXiv preprint arXiv:1604.03850. Martini, B., & Choo, K. K. R. (2014). Cloud forensic technical challenges and solutions: A snapshot.IEEE Cloud Computing,1(4), 20-25.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
13 CLOUD COMPUTING Morioka, E., & Sharbaf, M. S. (2015, April). Cloud computing: Digital forensic solutions. In201512thInternationalConferenceonInformationTechnology-New Generations(pp. 589-594). IEEE. Perumal, S., Norwawi, N. M., & Raman, V. (2015, October). Internet of Things (IoT) digital forensic investigation model: Top-down forensic approach methodology. In2015 FifthInternationalConferenceonDigitalInformationProcessingand Communications (ICDIPC)(pp. 19-23). IEEE. Simou, S., Kalloniatis, C., Kavakli, E., & Gritzalis, S. (2014, June). Cloud forensics: identifying the major issues and challenges. InInternational conference on advanced information systems engineering(pp. 271-284). Springer, Cham. Thethi, N., & Keane, A. (2014, February). Digital forensics investigations in the cloud. In2014 IEEE international advance computing conference (IACC)(pp. 1475-1480). IEEE. Wang, Y., Uehara, T., & Sasaki, R. (2015, July). Fog computing: Issues and challenges in securityandforensics.In2015IEEE39thAnnualComputerSoftwareand Applications Conference(Vol. 3, pp. 53-59). IEEE.