" The constant flow of information makes compiling a forensics report on any given item very difficult.
Legal issues may also hamper digital forensics in dealing with cloud issues. Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence and its subsequent forensic analysis. When a savvy and knowledgeable customer or business becomes the target of a criminal investigation, they could migrate their working environment to a cloud environment. This would provide a means for the business to continue its routine operations while the migrated environment is forensically analyzed. The migrated data only represents a temporary snapshot of when it was sent to the cloud. Since the data can be stored anywhere in the world, its scattering could be to a location or country where privacy laws are not readily enforced or non-existent. Establishing a chain of custody for the data would become difficult or impossible if its integrity and authenticity cannot be fully determined.
Ward (2011) agreed when he claimed " if you're investigating a case, you have a responsibility to collect all relevant information, without exception. Cloud computing means that data universe can be larger, more scattered and unstructured, as opposed to being 'controlled' within an organization; as a result, you need to collect from increasing and new cloud data sources and the retrieval process can be more of a challenge."
There are also many troubling potential forensic issues when the customer or user exits a cloud application. Items subject to forensic analysis, such as registry entries, temporary files, and other artifacts are lost, making malicious activity difficult to validate. With the huge amount of potential data flowing in and out of a cloud, how do you identify individual users of individual services provided by a transient host image, particularly when they make expert efforts to cover their tracks? What if the owner of the image decides to engage in malicious behavior, through the host server image, from a third IP address, and then claim someone must have stolen their password...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now