Skip to main content

A Meta-model for Assisting a Cloud Forensics Process

  • Conference paper
  • First Online:
Risks and Security of Internet and Systems (CRiSIS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9572))

Included in the following conference series:

Abstract

Cloud forensics introduce processes for resolving incidents occurring in cloud computing environments. However, designing cloud services capable to assist a cloud investigation process is of vital importance and recent research efforts concentrate on these directions. In addition, digital forensics methods cannot support a cloud investigation since cloud environments introduce many differences compared to traditional IT environments. This paper moves current research one step further by identifying the major concepts, actors and their relationships that participating in a cloud forensics process through the introduction of a new meta-model. The paper presents a running example as well for better understanding the suggested concepts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kalloniatis, C., Mouratidis, H., Manousakis, V., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput. Stand. Interfaces 36(4), 759–775 (2014). Elsevier

    Article  Google Scholar 

  2. Manousakis, V., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Privacy in the cloud: bridging the gap between design and implementation. In: Franch, X., Soffer, P. (eds.) CAiSE Workshops 2013. LNBIP, vol. 148, pp. 455–465. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  3. Kalloniatis, C., Manousakis, V., Mouratidis, H., Gritzalis, S.: Migrating into the cloud: identifying the major security and privacy concerns. In: Douligeris, C., Polemi, N., Karantjias, A., Lamersdorf, W. (eds.) Collaborative, Trusted and Privacy-Aware e/m-Services. IFIP AICT, vol. 399, pp. 73–87. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: an overview. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics VII. IFIP AICT, vol. 361, pp. 35–46. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. NIST. In: Group CFSW. NIST Cloud Computing Forensic Science Challenges (Draft NISTIR 8006). NIST Publication (2014)

    Google Scholar 

  6. Martini, B., Choo, K.-K.R.: An integrated conceptual digital forensic framework for cloud computing. Digital Invest. 9(2), 71–80 (2012)

    Article  Google Scholar 

  7. Adams, R.: The emergence of cloud storage and the need for a new digital forensic process model. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 79–104. IGI Global, Hershey (2013)

    Chapter  Google Scholar 

  8. Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud forensics: identifying the major issues and challenges. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 271–284. Springer, Heidelberg (2014)

    Google Scholar 

  9. Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud forensics solutions: a review. In: Iliadis, L., Papazoglou, M., Pohl, K. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 299–309. Springer, Heidelberg (2014)

    Google Scholar 

  10. Zawoad, S., Hasan, R.: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv preprint, arXiv:1302.6312 (2013)

  11. Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), May 2011, pp. 1–10. IEEE (2011)

    Google Scholar 

  12. Mishra, A.K., Matta, P., Pilli, E.S., Joshi, R.C.: Cloud forensics: state-of-the-art and research challenges. In: 2012 International Symposium on Cloud and Services Computing (ISCOS), December 2012, pp. 164–170. IEEE (2012)

    Google Scholar 

  13. Aydin, M., Jacob, J.: A comparison of major issues for the development of forensics in cloud computing. In: 2013 8th International Conference on Information Science and Technology (ICIST), pp. 77–82. IEEE (2013)

    Google Scholar 

  14. Zargari, S., Benford, D.: Cloud forensics: concepts, issues, and challenges. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), September 2012, pp. 236–243. IEEE (2012)

    Google Scholar 

  15. Palmer, G.: A road map for digital forensic research - report from the first Digital Forensics Research Workshop (DFRWS). Paper presented at the First Digital Forensic Research Workshop, Utica, NY, USA, pp. 1–48 (2001)

    Google Scholar 

  16. Reith, M., Carr, C., Gunsch, C.: An examination of digital forensic models. Int. J. Digital Evid. 1(3), 1–12 (2002). Fall

    Google Scholar 

  17. Ciardhuáin, S.Ó.: An extended model of cybercrime investigations. Int. J. Digital Evid. 3(1), 1–22 (2004). Summer

    Google Scholar 

  18. Carrier, B., Spafford, E.H.: Getting physical with the digital investigation process. Int. J. Digital Evid. 2(2), 1–20 (2003). Fall

    Google Scholar 

  19. Pooe, A., Labuschagne, L.: A conceptual model for digital forensic readiness. In: Information Security for South Africa (ISSA), pp. 1–8. IEEE (2012)

    Google Scholar 

  20. Al-Fedaghi, S., Al-Babtain, B.: Modeling the forensics process. Int. J. Secur. Appl. 6(4), 97–108 (2012)

    Google Scholar 

  21. Ruan, K., Carthy, J.: Cloud computing reference architecture and its forensic implications: a preliminary analysis. In: Rogers, M., Seigfried-Spellar, K.C. (eds.) ICDF2C 2012. LNICST, vol. 114, pp. 1–21. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  22. von Solms, S., Louwrens, C., Reekie, C., Grobler, T.: A control framework for digital forensics. In: Olivier, M.S., Shenoi, S. (eds.) Advances in Digital Forensics II. IFIP AICT, vol. 222, pp. 343–355. Springer, New York (2006)

    Chapter  Google Scholar 

  23. Selamat, S.R., Yusof, R., Sahib, S.: Mapping process of digital forensic investigation framework. Int. J. Comput. Sci. Netw. Secur. 8(10), 163–169 (2008)

    Google Scholar 

  24. Orton, I., Alva, A., Endicott-Popovsky, B.: Legal process and requirements for cloud forensic investigations. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 186–229. IGI Global, Hershey (2012)

    Google Scholar 

  25. Beebe, N.L., Clark, J.G.: A hierarchical, objectives-based framework for the digital investigations process. Digital Invest. Int. J. Digital Forensics Incident Response 2(2), 147–167 (2005)

    Google Scholar 

  26. Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., Leaf, D.: NIST cloud computing reference architecture. NIST Special Publication-500, p. 292 (2011)

    Google Scholar 

  27. Grispos, G., Storer, T., Glisson, W.B.: Calm before the storm: the challenges of cloud. In: Li, C.T. (ed.) Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, pp. 211–233. IGI Global, Hershey (2013)

    Chapter  Google Scholar 

  28. Dykstra, J., Sherman, A.T.: Understanding issues in cloud forensics: two hypothetical case studies. In: Proceedings of the Conference on Digital Forensics, Security and Law, Richmond, Virginia, USA, pp. 45–54 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stavros Simou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Simou, S., Kalloniatis, C., Mouratidis, H., Gritzalis, S. (2016). A Meta-model for Assisting a Cloud Forensics Process. In: Lambrinoudakis, C., Gabillon, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2015. Lecture Notes in Computer Science(), vol 9572. Springer, Cham. https://doi.org/10.1007/978-3-319-31811-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31811-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31810-3

  • Online ISBN: 978-3-319-31811-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics