Cloud Forensics

750 Words2 Pages

The green shading denotes the kinds of provisions available on each type of service and stresses what provisions are unavailable for each type. One notices that on a local machine, all services are available and can be sprang into action with ease compared to the cloud’s ones.
Description of table entries for a thorough appreciation.(
Networking
In a local environment, access to the network machines is readily available, two examples of which are switches and routers. Access to all of the traffic passing through the network and analysis can be laboured as a part of gathering as much data as possible. When using the cloud, even the CSP (Cloud Services Provider) does not have that kind of data, because it must not log all the traffic passing through the network, since users’ data is confidential and CSP can’t record, store, and analyse it. The CSP might only apply the IDS (Intrusion Detection System) or PDS (Intrusion Prevention System) solution to the network, which is only analysing traffic for malicious behaviour and alerting the provider of such activity.
Storage
Since there is no ultimate perfect computer crime, storage is the major reason why digital forensics hatched in the first place as data or trail would be left behind after any attack or intrusion. When hardware access to the machine is determined, one knows exactly where the data is located however, when using a cloud service, the data could be anywhere, even in different states, countries, or even continents. Even if the attacker is practically next door, the data’s residence is still nowhere near which mean that data cannot be retrieved or that easily. This presents forensic analysts with another in a series of dead ends.
Since Storage is the core of computer forensic...

... middle of paper ...

...Discovery and Cloud Computing: Control of ESI in the Cloud, 2010
Dan Morrill, Cloud Computing Making Forensics Easier , 2008
Dejan L, Cloud forensics:An overview, 2014
Dykstra J., Damien R, Forensic collection of electronic evidence from Infrastructure as a Service Cloud Computing, 2012
ELSEVIER, Digital Investigation 10, 2013
Gardner Inc, Cyber Forensics in the Cloud, 2010
Gartner Inc., Cloud Computing Will Be As Influential As E-business, June 26, 2008
INFOSEC Institute, overview-cloud-forensics, 2012
International journal of Cyber Security and Digital Forensics (IJCSDF) 2(2) 77-94, 2013
John JB, Cloud Computing: another Digital Forensic Challenge, 2009
Robinson RM, et al, Cyber Security and Information Systems October 2013
Taylor M, et al, forensic investigation of cloud computing systems, 2011
Zawoad S, “Digital Forensics in the Cloud”, Securing the Cloud, 2013

Open Document