Cloud Storage Forensics
DOI:
https://doi.org/10.24867/16BE25RadicKeywords:
cloud storage forensics, cloud computing, digital forensics, techniques, tools, evidenceAbstract
In this paper, cloud storage forensics technique and tools are analyzed. The main focus of the paper is on the challenges encountered when dealing with cloud forensics, digital cloud forensics framework, techniques and processes undertaken during the investigation, and the software and hardware tools used. Some of the legal aspects of cloud forensics, that forensics investigators need to be familiar with, are also mentioned. The paper also illustrates a case study that aims to complete and simulate the whole process on a hypothetical example.
References
[1] Red Hat, Inc., What is virtualization?, Red Hat, June 2018. [Online]. Доступно: https://www.redhat.com/en/topics/virtualization/what-is-virtualization (приступљено у септембру 2021.)
[2] Greg Gogolin, PhD, CISSP, Digital Forensics Explained, 2nd ed. Boca Raton, Taylor & Francis Group, LLC, 2021
[3] Flora Amato, Aniello Castiglione, Giovanni Cozzolino, Fabio Narducci, A semantic-based methodology for digital forensics analysis, Journal of Parallel and Distributed Computing vol. 138 , pp. 172–177, Jan. 2020
[4] A. M. Poorvi Jain, "Review of Cloud Forensics: Challenges, Solutions and Comparative Analysis,"International Journal of Computer Applications, pp. 28-34, 2019.
[5] Thankaraja Raja Sree and Somasundaram Mary Saira Bhanu, "Data Collection Techniques for Forensic Investigation in Cloud", Intechopen Digital Forensic Science, Sep 2020, [online] Available: http://www.grandviewresearch.com.
[6] N. Raza, "Challenges to network forensics in cloud computing," 2015 Conference on Information Assurance and Cyber Security (CIACS), 2015, pp. 22-29, doi: 10.1109/CIACS.2015.7395562.
[7] Karagiannis, C.; Vergidis, K. Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal. Information 2021, 12, 181. https://doi.org/10.3390/info12050181
[8] Council of Europe. Convention on Cybercrime. [Online]. Доступно: https://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561 (приступљено у септембру 2021.)
[2] Greg Gogolin, PhD, CISSP, Digital Forensics Explained, 2nd ed. Boca Raton, Taylor & Francis Group, LLC, 2021
[3] Flora Amato, Aniello Castiglione, Giovanni Cozzolino, Fabio Narducci, A semantic-based methodology for digital forensics analysis, Journal of Parallel and Distributed Computing vol. 138 , pp. 172–177, Jan. 2020
[4] A. M. Poorvi Jain, "Review of Cloud Forensics: Challenges, Solutions and Comparative Analysis,"International Journal of Computer Applications, pp. 28-34, 2019.
[5] Thankaraja Raja Sree and Somasundaram Mary Saira Bhanu, "Data Collection Techniques for Forensic Investigation in Cloud", Intechopen Digital Forensic Science, Sep 2020, [online] Available: http://www.grandviewresearch.com.
[6] N. Raza, "Challenges to network forensics in cloud computing," 2015 Conference on Information Assurance and Cyber Security (CIACS), 2015, pp. 22-29, doi: 10.1109/CIACS.2015.7395562.
[7] Karagiannis, C.; Vergidis, K. Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal. Information 2021, 12, 181. https://doi.org/10.3390/info12050181
[8] Council of Europe. Convention on Cybercrime. [Online]. Доступно: https://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561 (приступљено у септембру 2021.)
Downloads
Published
2022-02-03
Issue
Section
Electrotechnical and Computer Engineering