Cloud Computing Forensic Science

Authors

  • Sumanth V. Assistant Professor, Department of CSE, R. R. Institute of Technology, Bengaluru, Karnataka, India
  • Hemalatha R. UG Student, R. R. Institute of Technology, Visvesvaraya Technological University, Bangalore, India

Keywords:

cloud computing, forensic

Abstract

This section discusses the characteristics of cloud computing forensic science, elaborates on why cloud computing challenges traditional digital forensics methods, and describes what constitutes a challenge for cloud forensics. Many experts consider forensic science to be the application of a broad spectrum of sciences and technologies to the investigation and establishment of facts of interest in relation to criminal law, civil law, or regulatory issues. The rapid advance of cloud services requires the development of better forensic tools to keep pace. However, the resulting techniques may also be used for purposes other than legal and regulatory issues to reconstruct an event that has occurred. Cloud computing forensic science is the application of scientific principles, technological practices, and derived and proven methods to reconstruct past cloud computing events through the identification, acquisition, preservation, examination, interpretation, and reporting of potential digital evidence.

References

Buchanan W, Graves J, Bose N, Macfarlane R, Davison B, Ludwiniak R, (2011). Performance and student perception evaluation of cloud-based virtualized security and digital forensics labs. In HEA ICS Conference.

Cloud Security Alliance, Trusted Cloud Initiative, Enterprise Reference Architecture, https://downloads.cloudsecurityalliance.org/initiatives/tci/TCI_Reference_Architectur e_v2.0.pdf

Executive Office of the President (2012). Principles for Federal Engagement in Standards Activities to Address National Priorities, January 17, 2012 https://www.whitehouse.gov/sites/whitehouse.gov/ files/omb/memoranda/2012/m-12- 08_1.pdf

Hogan M, Liu F, Sokol A, Tong J (2011). NIST Cloud Computing Standards Roadmap. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication(SP) 500-291. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=909024

Liu F, Tong J, Mao J, Bohn RB, Messina JV, Badger ML, Leaf DM (2011) NIST Cloud Computing Reference Architecture (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 500-292. https://doi.org/10.6028/NIST.SP.500-292

Martini B, Choo KR, (2014) Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept. Proceedings of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 24–26 September 2014.

Mell P, Grance T (2011) The NIST Definition of Cloud Computing. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Special Publication (SP) 800- 145. https://doi.org/10.6028/NIST.SP.800-145

Ruan K, Carthy J, Kechadi T, Crosbie M (2011) Cloud Forensics. 7th IFIP Advances in Digital Forensics VII, G. Peterson and S. Shenoi (eds), vol. 361, pp. 35-46.

Zatyko K (2007) Commentary: Defining Digital Forensics. Forensic Magazine, January 2, 2007.

Downloads

Published

10-06-2019

How to Cite

Sumanth V., & Hemalatha R. (2019). Cloud Computing Forensic Science. International Journal of Management Studies (IJMS), 6(Spl Issue 9), 78–80. Retrieved from https://researchersworld.com/index.php/ijms/article/view/2218

Issue

Section

Articles