Cloud Computing Digital Forensics The Research Paper

PAGES
4
WORDS
1273
Cite

" The constant flow of information makes compiling a forensics report on any given item very difficult. Legal issues may also hamper digital forensics in dealing with cloud issues. Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence and its subsequent forensic analysis. When a savvy and knowledgeable customer or business becomes the target of a criminal investigation, they could migrate their working environment to a cloud environment. This would provide a means for the business to continue its routine operations while the migrated environment is forensically analyzed. The migrated data only represents a temporary snapshot of when it was sent to the cloud. Since the data can be stored anywhere in the world, its scattering could be to a location or country where privacy laws are not readily enforced or non-existent. Establishing a chain of custody for the data would become difficult or impossible if its integrity and authenticity cannot be fully determined.

Ward (2011) agreed when he claimed " if you're investigating a case, you have a responsibility to collect all relevant information, without exception. Cloud computing means that data universe can be larger, more scattered and unstructured, as opposed to being 'controlled' within an organization; as a result, you need to collect from increasing and new cloud data sources and the retrieval process can be more of a challenge."

There are also many troubling potential forensic issues when the customer or user exits a cloud application. Items subject to forensic analysis, such as registry entries, temporary files, and other artifacts are lost, making malicious activity difficult to validate. With the huge amount of potential data flowing in and out of a cloud, how do you identify individual users of individual services provided by a transient host image, particularly when they make expert efforts to cover their tracks? What if the owner of the image decides to engage in malicious behavior, through the host server image, from a third IP address, and then claim someone must have stolen their password...

...

Many forensic examiners recognize that there is no foolproof, universal method for extracting evidence in an admissible fashion from cloud-based applications, and in some cases, very little evidence is available to extract. As a result, cloud computing represents just one of the fast-paced technological developments that is presenting an ongoing challenge to legislators, law enforcement officials, and computer forensic analysts.
Conclusions

Unlike most important pieces of technology that help, the cloud seems to put digital forensics at a significant disadvantage. Applying laws and rules to places that have no laws and rules creates and interesting situation that is unique to both this technology and this time in history. Importance is not based on goodness or badness. Rather, the overall impact of any technology is seen in its importance.

Sources Used in Documents:

References

Birk, D. (2011). Technical Challenges of Forensic Investigations in Cloud Computing Environments. Advances in Digital Forensics, Jan 11. 2011. Retrieved from http://www.zurich.ibm.com/~cca/csc2011/submissions/birk.pdf

Riley, D. et al. (2011). Cloud Computing: Pros and Cons for Computer Forensic Investigations. International Journal Multimedia and Image Processing, 1,1, March 2011. Retrieved from http://infonomics- society.org/IJMIP/Cloud%20Computing_Pros%20and%20Cons%20for%20Computer%2 0 Forensic%20Investigations.pdf

Siddha, V. (2011). Cloud Computing: Challenges and possible solutions for digital forensics. Nimbula, 3 Nov 2011. Retrieved from http://blog.nimbula.com/corporate/2011/11/cloud- computing-challenges-and-possible-solutions-for-digital-forensics/

Ward, C. (2011). Digital Forensics: the cloud challenge. Business Cloud News, 1 Nov 2011. Retrieved from http://www.businesscloudnews.com/security/635-digital-forensics-the- cloud-challenge.html


Cite this Document:

"Cloud Computing Digital Forensics The" (2013, April 12) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/cloud-computing-digital-forensics-the-101528

"Cloud Computing Digital Forensics The" 12 April 2013. Web.26 April. 2024. <
https://www.paperdue.com/essay/cloud-computing-digital-forensics-the-101528>

"Cloud Computing Digital Forensics The", 12 April 2013, Accessed.26 April. 2024,
https://www.paperdue.com/essay/cloud-computing-digital-forensics-the-101528

Related Documents
Digital Forensics
PAGES 6 WORDS 1974

Digital forensic can be described as a branch of forensic science surrounding the recovery as well as investigation of materials which are found within digital devices, in many occasion regarding computer crime. Originally the term was always used as a synonym for computer forensics; however it has spread out to be used in investigations of the entire devices with capability of storing digital data. Having its grounds in the personal

Digital Forensics in the Criminal Justice SystemA wide array of challenges has emerged for digital forensic practitioners in recent years, including most especially the significant ethical dilemmas that are inherent to the field. In addition, innovative technologies such as the Internet of Things and drones as well as artificial intelligence and machine learning have also created numerous challenges and opportunities for advancement of the field by digital forensics. To identify

Digital Evidence: Plan of ActionIntroductionThis paper outlines the approach for examining digital evidence related to a suspected violation of company policy. It presents senior management with a plan for collecting and maximizing evidence in the case of John Smith, accused of digital IP theft. The methods described are grounded in forensic best practices and standards.Strategy for Maximizing Evidence Collection and Minimizing ImpactBased on the standards of ISO/IEC 27037 and National

Cloud SecurityIntroductionCloud security refers to the integrated technologies and procedures to respond to potential internal and external business threats. Its primary goal is to protect cloud computing infrastructure. It forms an essential element in the spheres of cybersecurity, particularly in the ever-growing digital business world. Enterprises have embraced digital migration in most of their services, so cloud security has become indispensable. Threats to data security are more advanced owing to

Cyber Forensics and Legal Considerations: Is the Law Keeping up with Advancing Technology? Introduction Because of the digital age and the possibilities it has introduced, digital forensics is now a necessity within the realm of law enforcement. However, there are numerous considerations to be made within this realm: constitutional law, property law, contract law, tort law, cybercrime, criminal procedure, evidence law, and cyber war. This paper will examine how the law is

Cloud Vendor vs. Cloud VendorIntroductionAmazon Web Services (AWS) and Google Cloud Platform (GCP) are two of the most popular cloud hosting vendors, providing a wide range of services such as computing power, storage, and databases to clients across the globe. This paper compares both vendors based on their Service Level Agreements (SLAs) and Key Performance Indicators (KPIs) and concludes with a recommendation.Comparing the Two VendorsIn general terms, both platforms provide