CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Cloud Computing Architecture and Forensic Investigation Challenges

by Ghania Al Sadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 7
Year of Publication: 2015
Authors: Ghania Al Sadi
10.5120/ijca2015905521

Ghania Al Sadi . Cloud Computing Architecture and Forensic Investigation Challenges. International Journal of Computer Applications. 124, 7 ( August 2015), 20-25. DOI=10.5120/ijca2015905521

@article{ 10.5120/ijca2015905521,
author = { Ghania Al Sadi },
title = { Cloud Computing Architecture and Forensic Investigation Challenges },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 7 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number7/22116-2015905521/ },
doi = { 10.5120/ijca2015905521 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:46.810883+05:30
%A Ghania Al Sadi
%T Cloud Computing Architecture and Forensic Investigation Challenges
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 7
%P 20-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Contrasting to traditional digital forensic investigations, investigating cloud crimes is considered as more difficult and complex process. The architecture of cloud computing is behind the complexity of conducting forensic investigation on cloud where data are synchronized and accessed using multiple and different devices in different places that reduce the chance to find a real device to seize for forensics investigation. There are a number of challenges in forensic investigation field faced by investigators which may complicate the way of conducting cloud forensic investigations to extract evidences. This research is studying the complexity of cloud architecture and how it affects digital investigations by addressing a number of challenges on conducting cloud forensic investigation.

References
  1. Akarsu B, Bayram K, Slisko J, Corona Cruz A. International Journal Of Scientific Research And Education. Ijsae.in [Internet]. 2013;6(3):221–32. Available from: http://ijsae.in/ijsaeems/index.php/ijsae/ article/viewFile/157/137
  2. Birk D, Wegener C. Technical issues of forensic investigatinos in cloud computing environments. Syst Approaches to Digit Forensic Eng. 2011;
  3. Dam M, Chen K. On the Security of Cloud Storage Services. MartindamDk [Internet]. 2011; Available from: http://martindam.dk/wp-content/uploads/cloudstorage.pdf
  4. Foster I, Zhao Y, Raicu I, Lu S. Cloud Computing and Grid Computing 360-Degree Compared. 2008 Grid Comput Environ Work [Internet]. 2008;1–10. Available from: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper. htm?arnumber=4738445
  5. Haggerty J. Digital Forensics in the Organisation. 2013;(October):17–20.
  6. Huo Y, Wang H, Hu L. A Cloud Storage Architecture Model for Data- Intensive Applications. 2011 Int Conf Comput Manag. 2011;(61073009):26–9.
  7. Kent K, Chevalier S, Grance T, Dang H. Guide to Integrating Forensic Techiques into Incident Response: Recommendations of the National Institute of Standards and Technology. 2006;(August):121.
  8. Maguire JN. Cra Ries. 2013;
  9. Martini B, Choo KKR. An integrated conceptual digital forensic framework for cloud computing. Digit Investig [Internet]. Elsevier Ltd; 2012;9(2):71–80. Available from: http://dx.doi.org/10.1016/j.diin.2012.07.001
  10. Martini B, Choo KKR. Cloud storage forensics: OwnCloud as a case study. Digit Investig [Internet]. Elsevier Ltd; 2013;10(4):287–99. Available from: http://dx.doi.org/10.1016/j.diin.2013.08.005
  11. Marturana F, Me G, Tacconi S. A Case Study on Digital Forensics in the Cloud. 2012 Int Conf Cyber-Enabled Distrib Comput Knowl Discov [Internet]. 2012;111–6. Available from: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6384952
  12. Mell P, Grance T. The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology. Nist Spec Publ [Internet]. 2011;145:7. Available from: http://www.mendeley.com/research/the-nist-definition-about-cloud-computing/
  13. Mulazzani M, Schrittwieser S, Weippl E, Leithner M, Huber M. Dark Clouds on the Horizon : Using Cloud Storage as Attack Vector and Online Slack Space. USENIX Secur [Internet]. 2011;8:11. Available from: http://research.securityresearch.at/wp-content/uploads/publications/dropboxUSENIX2011.pdf
  14. Ruan K, Carthy J, Kechadi T, Crosbie M. Cloud forensics : An overview. InformationWeek [Internet]. 2011;7(2009):16. Available from: http://cloudforensicsresearch.org/publication/Cloud_Forensics_An_Overview_7th_IFIP.pdf
  15. Sabahi F. Cloud computing security threats and responses. 2011 IEEE 3rd Int Conf Commun Softw Networks. 2011;245–9.
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing cloud criminals digital forensic forensic challenges virtualization synchronization