Abstract
Cloud computing is one of the significant topics of today’s era; due to the enhancement it brings to the Information Technology world. This transformation lead to its rapid adoption by different sectors, ranging from enterprise to personal usage. Organizations are constantly looking for ways to increase productivity with optimum cost; which derived the need for Cloud environments and its underlying virtualized infrastructure. With the increase usage of Cloud based infrastructure, criminals utilized its anonymity factor to hide their criminal activities; escaping from legal actions. This paper highlights the obstacles experienced during Cloud virtual layer forensics acquisition and analysis, due to lack of specialized forensics tools. We have developed a framework to aid in assessing the virtual environment readiness for forensics investigation and examine the applicability of existing state-of-the-art forensics tools to Cloud environment. The paper reveals the need for having specialized forensics tools for Cloud infrastructure forensics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mell, P., Grance, T.: The NIST definition of cloud computing (2011)
VMware, E.S.X., ESXi, V.: The market leading production-proven hypervisors. vmware. Disponível em: http://www.vmware.com/files/pdf/VMware-ESX-and-VMware-ESXi-DS-EN.pdf. Data de Acesso 11(11) (2009)
Harichandran, V.S., Breitinger, F., Baggili, I., Marrington, A.: A cyber forensics needs analysis survey: revisiting the domain’s needs a decade later. Comput. Secur. 57, 1–13 (2015)
Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)
Pichan, A., Lazarescu, M., Soh, S.T.: Cloud forensics: technical challenges, solutions and comparative analysis. Digit. Invest. 13, 38–57 (2015)
Khorshed, M., Ali, A., Wasimi, S.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Futur. Gener. Comput. Syst. 28(6), 833–851 (2012)
Rao, R., Velumadhava, K.: selvamani: data security challenges and its solutions in cloud computing. Proced. Comput. Sci. 48, 204–209 (2015)
Rozanski, S.: Using cloud data to accelerate forensic investigations. Netw. Secur. 2015(9), 19–20 (2015)
Quick, D., Choo, K.K.R.: Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digit. Invest. 10(3), 266–277 (2013)
Martini, B., Choo, K.K.: Cloud storage forensics: owncloud as a case study. Digit. Invest. 10(4), 287–299 (2013)
Kent, K., Chevalier, S., Grance, T., Dang, H:. Guide to Integrating Forensic Techniques into Incident Response. NIST Special Publication, pp. 800–886 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Jabir, R., Alfandi, O. (2018). Cloud Digital Forensics Evaluation and Crimes Detection. In: Belqasmi, F., Harroud, H., Agueh, M., Dssouli, R., Kamoun, F. (eds) Emerging Technologies for Developing Countries. AFRICATEK 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 206. Springer, Cham. https://doi.org/10.1007/978-3-319-67837-5_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-67837-5_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-67836-8
Online ISBN: 978-3-319-67837-5
eBook Packages: Computer ScienceComputer Science (R0)