Abstract

I'll address the fundamentals of Cloud Computing and Virtualization. The types of cloud computing deployment models and their relationship with the responsibility of the users are developed. The fundamentals of digital criminal investigation applied to Cloud Computing are discussed, and the most significant challenges are presented to criminal investigation and forensic sciences in this type and digital environment. The implications of Virtualization used in Cloud Computing in Criminal Investigation and Forensic Science are discussed. The paradigm case of Nested Virtualization technology is presented as an obstacle to Criminal investigation and forensic investigation. In cases of criminal investigations in traditional environments, it is common practice for computer expertise to turn off the equipment and make a copy of the disks that will be analysed later in the laboratory. This is unfeasible in a cloud computing environment, due to the large storage capacity, legal issues, geographic distribution and data control, which may vary depending on the model of service contracted. In addition, lack of physical access to data collection and lack of control over the system make information acquisition a challenging task for cloud expertise. Therefore, forensic computing has been restructured, bringing new techniques, solutions and research methods, giving rise to cloud forensics or expertise in the cloud. Thus, the so-called Forensic as a Service (FaaS) is dedicated to solving the security challenges inherent in the cloud environment. In this paper we will analyse some of these challenges.

Highlights

  • The distributed computing system called Cloud Computing is changing the way information platforms and information itself is created and used

  • If we want to analyse forensic network equipment such as switches or routers used by someone using Cloud Computing at the Software-as-Service Model level, we can never implement this investigation at the level of the suspect user; infrastructure provider, even though he is not suspected of any wrongdoing

  • It is complicated to keep your Cloud Computing data untouchable. Even because this goes against the technological nature of distributed computing systems, maintaining data integrity is the most challenging part of a forensic investigation process in Cloud Computing because the original data cannot be changed so that it can be presented in court as evidence

Read more

Summary

Introduction

The distributed computing system called Cloud Computing is changing the way information platforms and information itself is created and used. Investment in Cloud Computing is growing five times more than in traditional computing systems, in the areas of on-premises networks and information and technology services This type of distributed computing is an evolution of the technology in the model of multiple stakeholders, independent of the location, elastic, measured as a function of the consumption of the computational resources used. Traditional digital forensic methods are often criticised when applied to cloud computing in their admissibility of evidence in court due to various technical issues Examples of such problems are decentralization of data, segregation of customer data, jurisdictional areas, loss of metadata in the chain of custody, etc. This leads to improved environmental management, with increased scale and predictable costs [1]

The Architecture
Main Features
Reference Model
Security Architecture
Civil Liability by Availability and Implementation Model
Cloud Forensics
The Forensic Process in Cloud Computing
Forensic Procedures at the Network Level
Definition
Virtualization in Technical Terms
Virtual Machine
Main Problems
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call