Verified Document

Cloud Computing Digital Forensics The Research Paper

" The constant flow of information makes compiling a forensics report on any given item very difficult. Legal issues may also hamper digital forensics in dealing with cloud issues. Cloud computing raises some unique law enforcement concerns regarding the location of potential digital evidence and its subsequent forensic analysis. When a savvy and knowledgeable customer or business becomes the target of a criminal investigation, they could migrate their working environment to a cloud environment. This would provide a means for the business to continue its routine operations while the migrated environment is forensically analyzed. The migrated data only represents a temporary snapshot of when it was sent to the cloud. Since the data can be stored anywhere in the world, its scattering could be to a location or country where privacy laws are not readily enforced or non-existent. Establishing a chain of custody for the data would become difficult or impossible if its integrity and authenticity cannot be fully determined.

Ward (2011) agreed when he claimed " if you're investigating a case, you have a responsibility to collect all relevant information, without exception. Cloud computing means that data universe can be larger, more scattered and unstructured, as opposed to being 'controlled' within an organization; as a result, you need to collect from increasing and new cloud data sources and the retrieval process can be more of a challenge."

There are also many troubling potential forensic issues when the customer or user exits a cloud application. Items subject to forensic analysis, such as registry entries, temporary files, and other artifacts are lost, making malicious activity difficult to validate. With the huge amount of potential data flowing in and out of a cloud, how do you identify individual users of individual services provided by a transient host image, particularly when they make expert efforts to cover their tracks? What if the owner of the image decides to engage in malicious behavior, through the host server image, from a third IP address, and then claim someone must have stolen their password...

Many forensic examiners recognize that there is no foolproof, universal method for extracting evidence in an admissible fashion from cloud-based applications, and in some cases, very little evidence is available to extract. As a result, cloud computing represents just one of the fast-paced technological developments that is presenting an ongoing challenge to legislators, law enforcement officials, and computer forensic analysts.
Conclusions

Unlike most important pieces of technology that help, the cloud seems to put digital forensics at a significant disadvantage. Applying laws and rules to places that have no laws and rules creates and interesting situation that is unique to both this technology and this time in history. Importance is not based on goodness or badness. Rather, the overall impact of any technology is seen in its importance.

References

Birk, D. (2011). Technical Challenges of Forensic Investigations in Cloud Computing Environments. Advances in Digital Forensics, Jan 11. 2011. Retrieved from http://www.zurich.ibm.com/~cca/csc2011/submissions/birk.pdf

Riley, D. et al. (2011). Cloud Computing: Pros and Cons for Computer Forensic Investigations. International Journal Multimedia and Image Processing, 1,1, March 2011. Retrieved from http://infonomics- society.org/IJMIP/Cloud%20Computing_Pros%20and%20Cons%20for%20Computer%2 0 Forensic%20Investigations.pdf

Siddha, V. (2011). Cloud Computing: Challenges and possible solutions for digital forensics. Nimbula, 3 Nov 2011. Retrieved from http://blog.nimbula.com/corporate/2011/11/cloud- computing-challenges-and-possible-solutions-for-digital-forensics/

Ward, C. (2011). Digital Forensics: the cloud challenge. Business Cloud News, 1 Nov 2011. Retrieved from http://www.businesscloudnews.com/security/635-digital-forensics-the- cloud-challenge.html

Sources used in this document:
References

Birk, D. (2011). Technical Challenges of Forensic Investigations in Cloud Computing Environments. Advances in Digital Forensics, Jan 11. 2011. Retrieved from http://www.zurich.ibm.com/~cca/csc2011/submissions/birk.pdf

Riley, D. et al. (2011). Cloud Computing: Pros and Cons for Computer Forensic Investigations. International Journal Multimedia and Image Processing, 1,1, March 2011. Retrieved from http://infonomics- society.org/IJMIP/Cloud%20Computing_Pros%20and%20Cons%20for%20Computer%2 0 Forensic%20Investigations.pdf

Siddha, V. (2011). Cloud Computing: Challenges and possible solutions for digital forensics. Nimbula, 3 Nov 2011. Retrieved from http://blog.nimbula.com/corporate/2011/11/cloud- computing-challenges-and-possible-solutions-for-digital-forensics/

Ward, C. (2011). Digital Forensics: the cloud challenge. Business Cloud News, 1 Nov 2011. Retrieved from http://www.businesscloudnews.com/security/635-digital-forensics-the- cloud-challenge.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Digital Forensics
Words: 1974 Length: 6 Document Type: Research Paper

Digital forensic can be described as a branch of forensic science surrounding the recovery as well as investigation of materials which are found within digital devices, in many occasion regarding computer crime. Originally the term was always used as a synonym for computer forensics; however it has spread out to be used in investigations of the entire devices with capability of storing digital data. Having its grounds in the personal

How the Field of Digital Forensics in Responding to Emerging Threats...
Words: 1401 Length: 5 Document Type: Research Paper

Digital Forensics in the Criminal Justice SystemA wide array of challenges has emerged for digital forensic practitioners in recent years, including most especially the significant ethical dilemmas that are inherent to the field. In addition, innovative technologies such as the Internet of Things and drones as well as artificial intelligence and machine learning have also created numerous challenges and opportunities for advancement of the field by digital forensics. To identify

Investigation of an IP Theft Using Digital Forensics Tools
Words: 1363 Length: 5 Document Type: Professional Writing

Digital Evidence: Plan of ActionIntroductionThis paper outlines the approach for examining digital evidence related to a suspected violation of company policy. It presents senior management with a plan for collecting and maximizing evidence in the case of John Smith, accused of digital IP theft. The methods described are grounded in forensic best practices and standards.Strategy for Maximizing Evidence Collection and Minimizing ImpactBased on the standards of ISO/IEC 27037 and National

Cyber Forensic Or Digital Forensic Report
Words: 2149 Length: 8 Document Type: Essay

Essay Topic Examples 1. Emerging Trends in Cyber Forensics: Challenges and Solutions: ���� This essay could explore the latest advances in cyber forensic technology and methodologies. It can delve into the challenges that come with new forms of cybercrime and how professionals are developing innovative solutions to stay ahead in the digital arms race. Specifically, it could address the shift towards cloud forensics, mobile device analysis, and the implications of the

Cloud Security Key Elements
Words: 1594 Length: 5 Document Type: Term Paper

Cloud SecurityIntroductionCloud security refers to the integrated technologies and procedures to respond to potential internal and external business threats. Its primary goal is to protect cloud computing infrastructure. It forms an essential element in the spheres of cybersecurity, particularly in the ever-growing digital business world. Enterprises have embraced digital migration in most of their services, so cloud security has become indispensable. Threats to data security are more advanced owing to

Cyber Forensics and Legal Considerations
Words: 3240 Length: 11 Document Type: Term Paper

Cyber Forensics and Legal Considerations: Is the Law Keeping up with Advancing Technology? Introduction Because of the digital age and the possibilities it has introduced, digital forensics is now a necessity within the realm of law enforcement. However, there are numerous considerations to be made within this realm: constitutional law, property law, contract law, tort law, cybercrime, criminal procedure, evidence law, and cyber war. This paper will examine how the law is

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now