Cloud Forensics: Challenges and New Digital Forensic Projects
VerifiedAdded on 2023/06/04
|6
|2199
|177
AI Summary
This article discusses the challenges and new digital forensic projects in cloud forensics. It emphasizes the importance of standardized models and the impact of cloud computing on digital forensics. The article also explores the benefits of implementing cloud-based forensic investigation processes in existing cloud computing systems to fight cybercrime.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: CLOUD FORENSICS
CLOUD FORENSICS
Name of the Student:
Name of the University:
Author Note:
CLOUD FORENSICS
Name of the Student:
Name of the University:
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CLOUD FORENSICS
Table of Contents
Introduction...........................................................................................................................................2
Review of Previous Research...............................................................................................................2
New Digital Forensic Projects..............................................................................................................3
Conclusion and Recommendations.......................................................................................................3
References.............................................................................................................................................4
Table of Contents
Introduction...........................................................................................................................................2
Review of Previous Research...............................................................................................................2
New Digital Forensic Projects..............................................................................................................3
Conclusion and Recommendations.......................................................................................................3
References.............................................................................................................................................4
2CLOUD FORENSICS
Introduction
Researches on digital Forensics is the recent trends in the field of technology since the last
years of 20th century as the relevance of technology in criminal activities is increasing. In contrast
with regular forensic studies, the digital forensics study deals with data and files extracted from
gadgets and devices in digital format (Cozzolino, Poggi & Verdoliva, 2015). The term Digital
Forensics refers to a thorough process of identifying, analyzing and acquisition of information and
evidence related to any crime in digital formats. Such data are acquired from not only digital
gadgets like smartphones or computers and laptops but also from virtual data storages like clouds,
Internet of Things and hybrid clouds.
For Digital forensics, the importance of standardized model to guide the investigation is
important to address the actual issue related to the crime (Lillis, Becker, O'Sullivan, & Scanlon,
2016). However, there are different models have been proposed based on new technologies and
improved methods. This explains why recent researches involve implementation of new
technologies and processes in existing methods to increase efficiency and accuracy in investigation.
Cloud computing is the prevalent choice of many in recent times (Hitchcock, Le-Khac & Scanlon,
2016). The chances of criminal activities in the systems. In cloud based digital forensics studies, the
most common problem arises in case of data collecting is the remote location of the server can be
within other dominion. This is why researchers are trying to address such problems of cloud based
digital forensic problems (Yaqoob et al.,2017). There are some typical challenges investigators face
while using cloud based digital forensic processes. Cloud computing based forensic investigation
has been proved to be very effective for investigating hacking and illegal logging in any secured
system.
With the introduction of new technologies in the market, new problems emerge hampering
the overall process of existing digital forensic methods. For example the introduction of cloud
computing makes the information and evidence collection tough. Increased number of gadgets in
the system means increasing volume of data. The most difficult problem they face while
determining whether to use cloud based system or not depends on each step of investigation. Only
after acquiring login credentials and profile information from different devices and gadgets, the
necessity of cloud implementation can be assured. This is like, the investigator have to find keys for
each locks systematically to unlock the final information behind the last lock. The investigation will
fail if the investigators fail to retrieve lock information of anyone door (Pandya, Homayoun &
Dehghantanha, 2018). The second most difficult problem forensic investigators face with digital
forensics is related to the servers. It may not be possible to retrieve the servers physically as they
can be in different jurisdiction areas and the collection of metadata is not possible. This is why
recent researches on digital forensics based on cloud computing method are focusing on models,
which integrate different technologies to support the original process. For example, data mining is
an added model. This is also helpful in proposing new frameworks, which are helpful in identifying
new threats caused by recent technologies.
Review of Previous Research
Implementation of cloud computing method is a relatively new application in the
field of digital forensic. This is why; different researches related to the affectivity of the system are
carried out in the last two years. The benefit of implementing cloud computing in digital forensic
has given upper hand to the investigators while investigating different breadcrumbs of a cybercrime.
The system helps in identifying any illegal entry from any anomalous device and illegal activity.
However, every new research is adding new dimension to the application of cloud based forensic
investigation and challenges related to it.
Introduction
Researches on digital Forensics is the recent trends in the field of technology since the last
years of 20th century as the relevance of technology in criminal activities is increasing. In contrast
with regular forensic studies, the digital forensics study deals with data and files extracted from
gadgets and devices in digital format (Cozzolino, Poggi & Verdoliva, 2015). The term Digital
Forensics refers to a thorough process of identifying, analyzing and acquisition of information and
evidence related to any crime in digital formats. Such data are acquired from not only digital
gadgets like smartphones or computers and laptops but also from virtual data storages like clouds,
Internet of Things and hybrid clouds.
For Digital forensics, the importance of standardized model to guide the investigation is
important to address the actual issue related to the crime (Lillis, Becker, O'Sullivan, & Scanlon,
2016). However, there are different models have been proposed based on new technologies and
improved methods. This explains why recent researches involve implementation of new
technologies and processes in existing methods to increase efficiency and accuracy in investigation.
Cloud computing is the prevalent choice of many in recent times (Hitchcock, Le-Khac & Scanlon,
2016). The chances of criminal activities in the systems. In cloud based digital forensics studies, the
most common problem arises in case of data collecting is the remote location of the server can be
within other dominion. This is why researchers are trying to address such problems of cloud based
digital forensic problems (Yaqoob et al.,2017). There are some typical challenges investigators face
while using cloud based digital forensic processes. Cloud computing based forensic investigation
has been proved to be very effective for investigating hacking and illegal logging in any secured
system.
With the introduction of new technologies in the market, new problems emerge hampering
the overall process of existing digital forensic methods. For example the introduction of cloud
computing makes the information and evidence collection tough. Increased number of gadgets in
the system means increasing volume of data. The most difficult problem they face while
determining whether to use cloud based system or not depends on each step of investigation. Only
after acquiring login credentials and profile information from different devices and gadgets, the
necessity of cloud implementation can be assured. This is like, the investigator have to find keys for
each locks systematically to unlock the final information behind the last lock. The investigation will
fail if the investigators fail to retrieve lock information of anyone door (Pandya, Homayoun &
Dehghantanha, 2018). The second most difficult problem forensic investigators face with digital
forensics is related to the servers. It may not be possible to retrieve the servers physically as they
can be in different jurisdiction areas and the collection of metadata is not possible. This is why
recent researches on digital forensics based on cloud computing method are focusing on models,
which integrate different technologies to support the original process. For example, data mining is
an added model. This is also helpful in proposing new frameworks, which are helpful in identifying
new threats caused by recent technologies.
Review of Previous Research
Implementation of cloud computing method is a relatively new application in the
field of digital forensic. This is why; different researches related to the affectivity of the system are
carried out in the last two years. The benefit of implementing cloud computing in digital forensic
has given upper hand to the investigators while investigating different breadcrumbs of a cybercrime.
The system helps in identifying any illegal entry from any anomalous device and illegal activity.
However, every new research is adding new dimension to the application of cloud based forensic
investigation and challenges related to it.
3CLOUD FORENSICS
Rani, D. R., Sultana, S. N., & Sravani, P. L. (2016) has investigated the challenges related to
cloud computing and how they can be removed to achieve efficiency of highest level. From their
research work the steps of a proper framework of cloud based forensic can be structured. Any cloud
based computing system have some basic systematic approaches to investigate any cybercrime
within the system. The most important steps include notification and documentation of every illegal
entry in the system. Whenever, any anonymous device or person tries to get entry within any cloud-
based system, the cloud will enter an illegal entry within the system and try to allocate the user and
research every detail about him. The second most important feature of any cloud forensic system is
to keep the original data safe within the cloud server even if it has been deleted from any client
computer the main server will keep it documented within the system for future retrieval. The system
will also keep evidence of any cybercrime committed within the system. This is done by accessing
all the detail information about the crime like the illegal entry, data hacking and other details. On
the other hand, the system will also help the investigator to connect all the breadcrumbs to build the
chain of investigation and understand the exact crime in a better way. However, cloud computing
based forensic research methodology needs a long way to go to achieve perfection. This is because;
there are many issues, which need to be addressed to achieve perfection. One of the major
challenges of cloud based forensic is the unavailability of proper tool kit and cloud expert to
investigate a cybercrime. The scarcity of cloud-based cybercrime experts is a major reason most of
the time cybercrime investigations do not end in a positive way. Another major challenge with the
cloud computing system as per the researchers is that, there could be numerous number of user in a
system who are accessing the same file. Identifying one with criminal intention form, such huge list
of user is a tedious and erroneous job. This is why reconstruction of a crime scene can be sometimes
impossible. However, with a highly trained team of cloud computing experts, it is possible to
efficiently investigate a cybercrime and identify the culprits.
Alenezi et al., (2017) in their research paper has defied the popular belief that cyber security
and cybercrime investigation are two different field by implementing cloud based forensic
investigation process in the cloud based computing system which can identify any on-going
cybercrime within the system and keep track of the crime to help any investigator understand the
scenario. The researchers have proposed a hybrid server architecture within the cloud architecture,
which keeps track of all the activities of every user in the system. Starting from illegal registration
and log in trails to data hacking and deleting, everything will be tracked by the system and noted
within the hybrid server. In case of any cybercrime investigation, the system will automatically
provide details regarding the crime committed.
New Digital Forensic Projects
Urias, Young & Hatcher, (2018) in their research paper has discussed the impact of cloud
computing in the digital forensics and digital security systems. However, it is new compared to
other digital methods adopted for cybercrime investigations. The researchers has paved a way to
implement cloud based forensic method in existing cloud computing system to fight any kind of
cybercrime. The implementation of real time analysis of every activity in a cloud-based system will
eventually result in detecting a cybercrime and stop it even before it takes proper shape. An
intelligent system to analyze all the activities in the system will be a piece of cake for every
company. The system will start auto investigation every time any illegal log in or registration occurs
from any anonymous device or user. Immediately, the system will access the video feds of the
cameras near to the device even if it is in a remote location. After that, the system will generate a
flag and keep record of every activity of the user. When the system administrators access the
system, the flags will show up to them for future activity.
Ferguson, I., Renaud, K., & Irons, A. (2018) in their research are investigating the backlogs
of implementing cloud based forensic in any existing computer system to investigate a cybercrime
and how to cope with them. The researchers have discussed the backlogs like the thorough research
process of investigating all the illegal accesses in the system within a time-period. This is tedious
Rani, D. R., Sultana, S. N., & Sravani, P. L. (2016) has investigated the challenges related to
cloud computing and how they can be removed to achieve efficiency of highest level. From their
research work the steps of a proper framework of cloud based forensic can be structured. Any cloud
based computing system have some basic systematic approaches to investigate any cybercrime
within the system. The most important steps include notification and documentation of every illegal
entry in the system. Whenever, any anonymous device or person tries to get entry within any cloud-
based system, the cloud will enter an illegal entry within the system and try to allocate the user and
research every detail about him. The second most important feature of any cloud forensic system is
to keep the original data safe within the cloud server even if it has been deleted from any client
computer the main server will keep it documented within the system for future retrieval. The system
will also keep evidence of any cybercrime committed within the system. This is done by accessing
all the detail information about the crime like the illegal entry, data hacking and other details. On
the other hand, the system will also help the investigator to connect all the breadcrumbs to build the
chain of investigation and understand the exact crime in a better way. However, cloud computing
based forensic research methodology needs a long way to go to achieve perfection. This is because;
there are many issues, which need to be addressed to achieve perfection. One of the major
challenges of cloud based forensic is the unavailability of proper tool kit and cloud expert to
investigate a cybercrime. The scarcity of cloud-based cybercrime experts is a major reason most of
the time cybercrime investigations do not end in a positive way. Another major challenge with the
cloud computing system as per the researchers is that, there could be numerous number of user in a
system who are accessing the same file. Identifying one with criminal intention form, such huge list
of user is a tedious and erroneous job. This is why reconstruction of a crime scene can be sometimes
impossible. However, with a highly trained team of cloud computing experts, it is possible to
efficiently investigate a cybercrime and identify the culprits.
Alenezi et al., (2017) in their research paper has defied the popular belief that cyber security
and cybercrime investigation are two different field by implementing cloud based forensic
investigation process in the cloud based computing system which can identify any on-going
cybercrime within the system and keep track of the crime to help any investigator understand the
scenario. The researchers have proposed a hybrid server architecture within the cloud architecture,
which keeps track of all the activities of every user in the system. Starting from illegal registration
and log in trails to data hacking and deleting, everything will be tracked by the system and noted
within the hybrid server. In case of any cybercrime investigation, the system will automatically
provide details regarding the crime committed.
New Digital Forensic Projects
Urias, Young & Hatcher, (2018) in their research paper has discussed the impact of cloud
computing in the digital forensics and digital security systems. However, it is new compared to
other digital methods adopted for cybercrime investigations. The researchers has paved a way to
implement cloud based forensic method in existing cloud computing system to fight any kind of
cybercrime. The implementation of real time analysis of every activity in a cloud-based system will
eventually result in detecting a cybercrime and stop it even before it takes proper shape. An
intelligent system to analyze all the activities in the system will be a piece of cake for every
company. The system will start auto investigation every time any illegal log in or registration occurs
from any anonymous device or user. Immediately, the system will access the video feds of the
cameras near to the device even if it is in a remote location. After that, the system will generate a
flag and keep record of every activity of the user. When the system administrators access the
system, the flags will show up to them for future activity.
Ferguson, I., Renaud, K., & Irons, A. (2018) in their research are investigating the backlogs
of implementing cloud based forensic in any existing computer system to investigate a cybercrime
and how to cope with them. The researchers have discussed the backlogs like the thorough research
process of investigating all the illegal accesses in the system within a time-period. This is tedious
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CLOUD FORENSICS
and erroneous. The researchers have shown that implementation of cloud computing in real time
investigating any situation is effective than investigating a crime after it has taken proper shape.
Conclusion and Recommendations
To ensure better security and data safety for government organizations like S.H.I.E.L.D, the
administration needs to recruit expert cloud based system architects and cybercrime investigators to
supervise the system. It is the duty of the investigators to search for any kind of criminal activity
over the system in real time. To implement such a system, S.H.I.E.L.D need to implement a system,
which can have access to every eyes and ears related to the security of all the facilities of
S.H.I.E.L.D storehouses and offices. Starting from camera and microphones in the system to the log
in portals and computers, the security professionals has to keep an eye on every part of the cloud
system of S.H.I.E.L.D. However, to achieve perfection, the experts need to incorporate other
computer technologies like data mining and SDN within cloud forensic and security systems. The
modern technique combining real time investigation in cloud based system and cloud forensic is the
best way for S.H.I.E.L.D to stop any criminal activity within the system.
and erroneous. The researchers have shown that implementation of cloud computing in real time
investigating any situation is effective than investigating a crime after it has taken proper shape.
Conclusion and Recommendations
To ensure better security and data safety for government organizations like S.H.I.E.L.D, the
administration needs to recruit expert cloud based system architects and cybercrime investigators to
supervise the system. It is the duty of the investigators to search for any kind of criminal activity
over the system in real time. To implement such a system, S.H.I.E.L.D need to implement a system,
which can have access to every eyes and ears related to the security of all the facilities of
S.H.I.E.L.D storehouses and offices. Starting from camera and microphones in the system to the log
in portals and computers, the security professionals has to keep an eye on every part of the cloud
system of S.H.I.E.L.D. However, to achieve perfection, the experts need to incorporate other
computer technologies like data mining and SDN within cloud forensic and security systems. The
modern technique combining real time investigation in cloud based system and cloud forensic is the
best way for S.H.I.E.L.D to stop any criminal activity within the system.
5CLOUD FORENSICS
References
Cozzolino, D., Poggi, G., & Verdoliva, L. (2015). Efficient dense-field copy–move forgery
detection. IEEE Transactions on Information Forensics and Security, 10(11), 2284-2297.
Hitchcock, B., Le-Khac, N. A., & Scanlon, M. (2016). Tiered forensic methodology model for
Digital Field Triage by non-digital evidence specialists. Digital Investigation, 16, S75-S85.
Lillis, D., Becker, B., O'Sullivan, T., & Scanlon, M. (2016). Current challenges and future research
areas for digital forensic investigation. arXiv preprint arXiv:1604.03850.
Yaqoob, I., Ahmed, E., Hashem, I. A. T., Ahmed, A. I. A., Gani, A., Imran, M., & Guizani, M.
(2017). Internet of things architecture: Recent advances, taxonomy, requirements, and open
challenges. IEEE wireless communications, 24(3), 10-16.
Rani, D. R., Sultana, S. N., & Sravani, P. L. (2016). Challenges of digital forensics in cloud
computing environment. Indian Journal of Science and Technology, 9(17).
Alenezi, A., Zulkipli, N. H. N., Atlam, H. F., Walters, R. J., & Wills, G. B. (2017, April). The
Impact of Cloud Forensic Readiness on Security. In CLOSER (pp. 511-517).
Urias, V., Young, J., & Hatcher, S. (2018). Implications of cloud computing on digital
forensics. GSTF Journal on Computing (JoC), 1(1).
Pandya, M. K., Homayoun, S., & Dehghantanha, A. (2018). Forensics Investigation of OpenFlow-
Based SDN Platforms. Cyber Threat Intelligence, 281-296.
Ferguson, I., Renaud, K., & Irons, A. (2018). Dark Clouds on the Horizon The Challenge of Cloud
Forensics. CLOUD COMPUTING 2018, 61.
Hausknecht, K., Foit, D., & Burić, J. (2015, May). RAM data significance in digital forensics.
In Information and Communication Technology, Electronics and Microelectronics
(MIPRO), 2015 38th International Convention on (pp. 1372-1375). IEEE.
References
Cozzolino, D., Poggi, G., & Verdoliva, L. (2015). Efficient dense-field copy–move forgery
detection. IEEE Transactions on Information Forensics and Security, 10(11), 2284-2297.
Hitchcock, B., Le-Khac, N. A., & Scanlon, M. (2016). Tiered forensic methodology model for
Digital Field Triage by non-digital evidence specialists. Digital Investigation, 16, S75-S85.
Lillis, D., Becker, B., O'Sullivan, T., & Scanlon, M. (2016). Current challenges and future research
areas for digital forensic investigation. arXiv preprint arXiv:1604.03850.
Yaqoob, I., Ahmed, E., Hashem, I. A. T., Ahmed, A. I. A., Gani, A., Imran, M., & Guizani, M.
(2017). Internet of things architecture: Recent advances, taxonomy, requirements, and open
challenges. IEEE wireless communications, 24(3), 10-16.
Rani, D. R., Sultana, S. N., & Sravani, P. L. (2016). Challenges of digital forensics in cloud
computing environment. Indian Journal of Science and Technology, 9(17).
Alenezi, A., Zulkipli, N. H. N., Atlam, H. F., Walters, R. J., & Wills, G. B. (2017, April). The
Impact of Cloud Forensic Readiness on Security. In CLOSER (pp. 511-517).
Urias, V., Young, J., & Hatcher, S. (2018). Implications of cloud computing on digital
forensics. GSTF Journal on Computing (JoC), 1(1).
Pandya, M. K., Homayoun, S., & Dehghantanha, A. (2018). Forensics Investigation of OpenFlow-
Based SDN Platforms. Cyber Threat Intelligence, 281-296.
Ferguson, I., Renaud, K., & Irons, A. (2018). Dark Clouds on the Horizon The Challenge of Cloud
Forensics. CLOUD COMPUTING 2018, 61.
Hausknecht, K., Foit, D., & Burić, J. (2015, May). RAM data significance in digital forensics.
In Information and Communication Technology, Electronics and Microelectronics
(MIPRO), 2015 38th International Convention on (pp. 1372-1375). IEEE.
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.