Abstract
Cloud forensics introduce processes for resolving incidents occurring in cloud computing environments. However, designing cloud services capable to assist a cloud investigation process is of vital importance and recent research efforts concentrate on these directions. In addition, digital forensics methods cannot support a cloud investigation since cloud environments introduce many differences compared to traditional IT environments. This paper moves current research one step further by identifying the major concepts, actors and their relationships that participating in a cloud forensics process through the introduction of a new meta-model. The paper presents a running example as well for better understanding the suggested concepts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kalloniatis, C., Mouratidis, H., Manousakis, V., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput. Stand. Interfaces 36(4), 759–775 (2014). Elsevier
Manousakis, V., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Privacy in the cloud: bridging the gap between design and implementation. In: Franch, X., Soffer, P. (eds.) CAiSE Workshops 2013. LNBIP, vol. 148, pp. 455–465. Springer, Heidelberg (2013)
Kalloniatis, C., Manousakis, V., Mouratidis, H., Gritzalis, S.: Migrating into the cloud: identifying the major security and privacy concerns. In: Douligeris, C., Polemi, N., Karantjias, A., Lamersdorf, W. (eds.) Collaborative, Trusted and Privacy-Aware e/m-Services. IFIP AICT, vol. 399, pp. 73–87. Springer, Heidelberg (2013)
Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: an overview. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics VII. IFIP AICT, vol. 361, pp. 35–46. Springer, Heidelberg (2011)
NIST. In: Group CFSW. NIST Cloud Computing Forensic Science Challenges (Draft NISTIR 8006). NIST Publication (2014)
Martini, B., Choo, K.-K.R.: An integrated conceptual digital forensic framework for cloud computing. Digital Invest. 9(2), 71–80 (2012)
Adams, R.: The emergence of cloud storage and the need for a new digital forensic process model. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 79–104. IGI Global, Hershey (2013)
Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud forensics: identifying the major issues and challenges. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 271–284. Springer, Heidelberg (2014)
Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud forensics solutions: a review. In: Iliadis, L., Papazoglou, M., Pohl, K. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 299–309. Springer, Heidelberg (2014)
Zawoad, S., Hasan, R.: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv preprint, arXiv:1302.6312 (2013)
Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), May 2011, pp. 1–10. IEEE (2011)
Mishra, A.K., Matta, P., Pilli, E.S., Joshi, R.C.: Cloud forensics: state-of-the-art and research challenges. In: 2012 International Symposium on Cloud and Services Computing (ISCOS), December 2012, pp. 164–170. IEEE (2012)
Aydin, M., Jacob, J.: A comparison of major issues for the development of forensics in cloud computing. In: 2013 8th International Conference on Information Science and Technology (ICIST), pp. 77–82. IEEE (2013)
Zargari, S., Benford, D.: Cloud forensics: concepts, issues, and challenges. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), September 2012, pp. 236–243. IEEE (2012)
Palmer, G.: A road map for digital forensic research - report from the first Digital Forensics Research Workshop (DFRWS). Paper presented at the First Digital Forensic Research Workshop, Utica, NY, USA, pp. 1–48 (2001)
Reith, M., Carr, C., Gunsch, C.: An examination of digital forensic models. Int. J. Digital Evid. 1(3), 1–12 (2002). Fall
Ciardhuáin, S.Ó.: An extended model of cybercrime investigations. Int. J. Digital Evid. 3(1), 1–22 (2004). Summer
Carrier, B., Spafford, E.H.: Getting physical with the digital investigation process. Int. J. Digital Evid. 2(2), 1–20 (2003). Fall
Pooe, A., Labuschagne, L.: A conceptual model for digital forensic readiness. In: Information Security for South Africa (ISSA), pp. 1–8. IEEE (2012)
Al-Fedaghi, S., Al-Babtain, B.: Modeling the forensics process. Int. J. Secur. Appl. 6(4), 97–108 (2012)
Ruan, K., Carthy, J.: Cloud computing reference architecture and its forensic implications: a preliminary analysis. In: Rogers, M., Seigfried-Spellar, K.C. (eds.) ICDF2C 2012. LNICST, vol. 114, pp. 1–21. Springer, Heidelberg (2013)
von Solms, S., Louwrens, C., Reekie, C., Grobler, T.: A control framework for digital forensics. In: Olivier, M.S., Shenoi, S. (eds.) Advances in Digital Forensics II. IFIP AICT, vol. 222, pp. 343–355. Springer, New York (2006)
Selamat, S.R., Yusof, R., Sahib, S.: Mapping process of digital forensic investigation framework. Int. J. Comput. Sci. Netw. Secur. 8(10), 163–169 (2008)
Orton, I., Alva, A., Endicott-Popovsky, B.: Legal process and requirements for cloud forensic investigations. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 186–229. IGI Global, Hershey (2012)
Beebe, N.L., Clark, J.G.: A hierarchical, objectives-based framework for the digital investigations process. Digital Invest. Int. J. Digital Forensics Incident Response 2(2), 147–167 (2005)
Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., Leaf, D.: NIST cloud computing reference architecture. NIST Special Publication-500, p. 292 (2011)
Grispos, G., Storer, T., Glisson, W.B.: Calm before the storm: the challenges of cloud. In: Li, C.T. (ed.) Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, pp. 211–233. IGI Global, Hershey (2013)
Dykstra, J., Sherman, A.T.: Understanding issues in cloud forensics: two hypothetical case studies. In: Proceedings of the Conference on Digital Forensics, Security and Law, Richmond, Virginia, USA, pp. 45–54 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Simou, S., Kalloniatis, C., Mouratidis, H., Gritzalis, S. (2016). A Meta-model for Assisting a Cloud Forensics Process. In: Lambrinoudakis, C., Gabillon, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2015. Lecture Notes in Computer Science(), vol 9572. Springer, Cham. https://doi.org/10.1007/978-3-319-31811-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-31811-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31810-3
Online ISBN: 978-3-319-31811-0
eBook Packages: Computer ScienceComputer Science (R0)