Title :
Forensics investigation challenges in cloud computing environments
Author :
Damshenas, Mohsen ; Dehghantanha, Ali ; Mahmoud, Ramlan ; Bin Shamsuddin, Solahuddin
Author_Institution :
Fac. of Comput. Sci. & Inf. Technol., Univ. Putra Malaysia, Serdang, Malaysia
Abstract :
Cloud computing discusses about sharing any imaginable entity such as process units, storage devices or software. The provided service is utterly economical and expandable. Cloud computing attractive benefits entice huge interest of both business owners and cyber thefts. Consequently, the “computer forensic investigation” step into the play to find evidences against criminals. As a result of the new technology and methods used in cloud computing, the forensic investigation techniques face different types of issues while inspecting the case. The most profound challenges are difficulties to deal with different rulings obliged on variety of data saved in different locations, limited access to obtain evidences from cloud and even the issue of seizing the physical evidence for the sake of integrity validation or evidence presentation. This paper suggests a simple yet very useful solution to conquer the aforementioned issues in forensic investigation of cloud systems. Utilizing TPM in hypervisor, implementing multi-factor authentication and updating the cloud service provider policy to provide persistent storage devices are some of the recommended solutions. Utilizing the proposed solutions, the cloud service will be compatible to the current digital forensic investigation practices; alongside it brings the great advantage of being investigable and consequently the trust of the client.
Keywords :
Web services; cloud computing; computer forensics; information retrieval; trusted computing; TPM; business owner; cloud computing; cloud service provider policy; computer forensic investigation; cyber theft; data access; digital forensic investigation; entity sharing; hypervisor; multifactor authentication; trusted computing; Cloud computing; Computational modeling; Computers; Digital forensics; IEEE Xplore; Media; cloud computing; forensic challenges; forensics investigation; security; virtualization;
Conference_Titel :
Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4673-1425-1
DOI :
10.1109/CyberSec.2012.6246092