Skip to main content

Cloud Digital Forensics Evaluation and Crimes Detection

  • Conference paper
  • First Online:
Emerging Technologies for Developing Countries (AFRICATEK 2017)

Abstract

Cloud computing is one of the significant topics of today’s era; due to the enhancement it brings to the Information Technology world. This transformation lead to its rapid adoption by different sectors, ranging from enterprise to personal usage. Organizations are constantly looking for ways to increase productivity with optimum cost; which derived the need for Cloud environments and its underlying virtualized infrastructure. With the increase usage of Cloud based infrastructure, criminals utilized its anonymity factor to hide their criminal activities; escaping from legal actions. This paper highlights the obstacles experienced during Cloud virtual layer forensics acquisition and analysis, due to lack of specialized forensics tools. We have developed a framework to aid in assessing the virtual environment readiness for forensics investigation and examine the applicability of existing state-of-the-art forensics tools to Cloud environment. The paper reveals the need for having specialized forensics tools for Cloud infrastructure forensics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mell, P., Grance, T.: The NIST definition of cloud computing (2011)

    Google Scholar 

  2. VMware, E.S.X., ESXi, V.: The market leading production-proven hypervisors. vmware. Disponível em: http://www.vmware.com/files/pdf/VMware-ESX-and-VMware-ESXi-DS-EN.pdf. Data de Acesso 11(11) (2009)

  3. Harichandran, V.S., Breitinger, F., Baggili, I., Marrington, A.: A cyber forensics needs analysis survey: revisiting the domain’s needs a decade later. Comput. Secur. 57, 1–13 (2015)

    Article  Google Scholar 

  4. Ali, M., Khan, S.U., Vasilakos, A.V.: Security in cloud computing: opportunities and challenges. Inf. Sci. 305, 357–383 (2015)

    Article  MathSciNet  Google Scholar 

  5. Pichan, A., Lazarescu, M., Soh, S.T.: Cloud forensics: technical challenges, solutions and comparative analysis. Digit. Invest. 13, 38–57 (2015)

    Article  Google Scholar 

  6. Khorshed, M., Ali, A., Wasimi, S.: A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Futur. Gener. Comput. Syst. 28(6), 833–851 (2012)

    Article  Google Scholar 

  7. Rao, R., Velumadhava, K.: selvamani: data security challenges and its solutions in cloud computing. Proced. Comput. Sci. 48, 204–209 (2015)

    Article  Google Scholar 

  8. Rozanski, S.: Using cloud data to accelerate forensic investigations. Netw. Secur. 2015(9), 19–20 (2015)

    Article  Google Scholar 

  9. Quick, D., Choo, K.K.R.: Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digit. Invest. 10(3), 266–277 (2013)

    Article  Google Scholar 

  10. Martini, B., Choo, K.K.: Cloud storage forensics: owncloud as a case study. Digit. Invest. 10(4), 287–299 (2013)

    Article  Google Scholar 

  11. Kent, K., Chevalier, S., Grance, T., Dang, H:. Guide to Integrating Forensic Techniques into Incident Response. NIST Special Publication, pp. 800–886 (2006)

    Google Scholar 

  12. vmware. https://www.vmware.com/support/ws55/doc/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raja Jabir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Jabir, R., Alfandi, O. (2018). Cloud Digital Forensics Evaluation and Crimes Detection. In: Belqasmi, F., Harroud, H., Agueh, M., Dssouli, R., Kamoun, F. (eds) Emerging Technologies for Developing Countries. AFRICATEK 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 206. Springer, Cham. https://doi.org/10.1007/978-3-319-67837-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67837-5_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67836-8

  • Online ISBN: 978-3-319-67837-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics