The Challenges of Cloud Computing in Forensic Science
MLA Style:Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey, Dr. Jun Li"The Challenges of Cloud Computing in Forensic Science" International Journal of Computer Trends and Technology 67.7 (2019): 40-48.
APA Style Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey, Dr. Jun Li. The Challenges of Cloud Computing in Forensic Science International Journal of Computer Trends and Technology, 67(7),40-48.
Abstract
Cloud computing (CC) is rapidly growing new information technology (IT) in private, public and especially in Government sectors internationally. CC technology facilitates rather than deploy and manage an in-house physical IT infrastructure by having local servers or personal devices to manage their softwares application. This new technology helps to transfer their traditional IT services model into remote, virtualised environments, which are often hosted and managed by the third parties. Therefore, CC environment of any organisation turn prospective opportunity for cyber attackers, which is become a primary challenges of CC in the protection of valuable data from different types of attacks. CC posed a serious risk and major challenge to digital investigators, also offers sufficient opportunities to investigators for better refining the forensic science. This study summarises the key areas of CC forensics science challenges and analyses by the researched performed by other researchers. The challenges also presented along with associated literature that particularly reference them. Finally the discussion and analysis, which is based on the study finding to consider the challenges provoke by the CC forensics science on our findings.
Reference
[1] Journal: A Survey Based Investigation for Cloud Computing Adoption Internationally. Authors Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey andDr. Jun Li. International Journal of Computer Trends and Technology (IJCTT) - Volume 67 Issue 4 - April 2019. ISSN: 2231-2803 United Kingdom. http://www.ijcttjournal.org Page 106
[2] Journal: A Systematic Literature Review of Factors Affecting Cloud Computing Adoption Internationally. Authors Raja M. Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey andDr. Jun Li. International Journal of Computer Trends and Technology (IJCTT) - Volume 67 Issue 3 - March 2019. ISSN: 2231-2803 United Kingdom. http://www.ijcttjournal.org Page 41
[3] Journal: Factors Analysis of the Adoption of Cloud Computing Adoption In England. Authors Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey andDr. Jun Li. International Journal of Computer Trends and Technology (IJCTT) - Volume 67 Issue 6 - June 2019. ISSN: 2231-2803 United Kingdom. http://www.ijcttjournal.org Page 18-30
[4] Journal:Effects of Industry Type on ICT Adoption among Malaysian SMEs. Authors Khong Sin Tan ,Uchenna Cyril Eze, and Siong Choy Chong.
[5] Article: Factors That Influence Adoption of Cloud Computing: An Empirical Study of Australian SMEs. Authors Ishan Senarathna, Carla Wilkin, Matthew Warren, William Yeoh and Scott Salzman
[6] Paper: Cloud Computing Strategy Direction Paper. By the Department of Finance and Deregulation (DFD) Cloud Computing Strategic, by the Australian Government.
[7] Article: Challenges and Proposed Solutions for Cloud Forensic. Authors Puraj Desai, Mehul Solanki, AkshayGadhwal, Aalap Shah and Bhumika Patel. Puraj Desai et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 5, Issue 1( Part 2), January 2015, pp.37-42. https://pdfs.semanticscholar.org/4d43/19304cba36bd73695f9be7c33155dac5c0fc.pdf
[8] Article: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. Authors Shams Zawoad and Ragib Hasan. February 2013. https://www.researchgate.net/publication/235712413_Cloud_Forensics_A_Meta-Study_of_Challenges_Approaches_and_OpenProblems
[9] Press Release: Gartner Forecasts Worldwide Public Cloud Revenue to Grow 17.3 Percent in 2019. Stamford, Conn., September 12, 2018. USA. To contact Katie Costello, Gartner,This email address is being protected from spambots. You need JavaScript enabled to view it.,https://www.gartner.com/en/newsroom/press-releases/2019-04-02-gartner-forecasts-worldwide-public-cloud-revenue-to-g
[10] Journal: Design of digital forensic technique for cloud computing. Authors DeoyaniShirkhedkar and SulabhaPatil. International Journal of Advance Research in Computer Science and Management Studies. Volume 2, Issue 6, June 2014, India. Pg. 192-194. https://www.academia.edu/7655461/Design_of_digital_forensic_technique_for_cloud_computing
[11] Journal: Some Forensic & Security Issues of Cloud Computing. Authors Ashish Badiye, Neeti Kapoor and Pooja Shelke. Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering. India. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.428.5521&rep=rep1&type=pdf
[12] Workshop: Technical Challenges of Forensic Investigations in Cloud Computing Environments. Author Dominik Birk January 12, 2011 https://pdfs.semanticscholar.org/c776/0c5d82142813add66abc52eac589767df1f8.pdf
[13] Journal:Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics. Authors G. Grispos, T. Storer, and W.B. Glisson. International Journal of Digital Crime and Forensics, Volume 4, Issue 2, Pages 28-48, 8 October 2014. https://arxiv.org/ftp/arxiv/papers/1410/1410.2123.pdf
[14] Journal: Cloud Computing Adoption in Enterprise: Challenges and Benefits. , Authors Raja Muhammad Ubaid Ullah, Dr.Kevan A. Buckley,Dr. Mary Garvey and Dr. Jun Li. International Journal of Computer Trends and Technology (IJCTT) - Volume 67 Issue 6 - June 2019. ISSN: 2231-2803. Pages 93-104. United Kingdom https://www.ijcttjournal.org/2019/Volume-67%20Issue-6/IJCTT-V67I6P116.pdf
[15] Book: The Best Damm Cybercrime and Digital Forensics Book Period. Authors Wiles, Jack/Reyes and Anthony. ISBN: 9780080556086. Print ISBN: 9781597492287. Publisher: Elsevier Science & Technology. Publication Year: 2011.
[16] Publication: Guide To Integrating Forensic Techniques Into Incident Response. Authors Karen Kent, Suzanne Chevalier, Tim Grance and Hung Dang. Computer Security Division Information Technology Laboratory, National Institute of Standards and Technology (NIST) Gaithersburg, MD 20899-8930 August 2006. https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-86.pdf
[17] Article: “Computer forensics–an overview,” By Frederick Gallegos, CISA, CDE, CGFM, Copyright 2005, Information Systems Audit and control Association. All Rights Reserved. www.isaca.org. https://my.infotex.com/wp-content/uploads/2012/03/computer_forensics_overview_isaca.pdf
[18] Paper: An explanation of computer forensics. Author Robbins, J. (2008). National Forensics Center, 774, 10-143.
[19] Journal: Challenges and Proposed Solutions for Cloud Forensic. Authors Puraj Desai, Mehul Solanki, AkshayGadhwal, Aalap Shah and Bhumika Patel. Puraj Desai et al Int. Journal of Engineering Research and Applications,ISSN : 2248-9622, Vol. 5, Issue 1( Part 2), January 2015, pp.37-42. https://pdfs.semanticscholar.org/4d43/19304cba36bd73695f9be7c33155dac5c0fc.pdf
[20] Article: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. Authors Shams Zawoad and Ragib Hasan. 26th February 2013, Article https://www.researchgate.net/publication/235712413_Cloud_Forensics_A_Meta-Study_of_Challenges_Approaches_and_OpenProblems
[21] Newsletter: Cyber Forensics in the Cloud. Authors Scott Zimmerman and Dominick. The Newsletter for Information Assurance Technology Professionals, Volume 14 Number 1 • Winter 2011. https://www.csiac.org/wp-content/uploads/2016/02/Vol14_No1.pdf
[22] Conference: Forensic Process as a Service (FPaaS) for Cloud Computing. Authors AmnaEleyan and DerarEleyan. 2015 European Intelligence and Security Informatics Conference. https://www.researchgate.net/publication/302603537_Forensic_Process_as_a_Service_FPaaS_for_Cloud_Computing
[23] Document: Association of Chief Police Officers (ACPO). Author DAC Janet Williams QPM. Force/Organisation Metropolitan Police Service, Version 5, ACPO © 2012. https://www.digital-detective.net/digital-forensics-documents/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf
[24] Document: The European Union Agency for Network and Information Security (ENISA). Authors Supervisor of the Study: ENISA, Authors of the Study: ENISA and Philip Anderson (Northumbria University, UK). © 2014, ISBN 978-92-9204-111-3 doi: 10.2824/068545. https://www.enisa.europa.eu/publications/electronic-evidence-a-basic-guide-for-first-responders/at_download/fullReport
[25] CyberCrime@IPA, EU/COE Joint Project on Regional Cooperation against Cybercrime, Electronic evidence guide - A basic guide for police officers, prosecutors and judges,Version 1.0, Authors: Jones, N., George, E., Insa Mérida, F., Rasmussen, U., Völzow, V. http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Electronic Evidence Guide/default_en.asp
[26] CyberCrime@IPA, Electronic evidence guide - A basic guide for police officers, prosecutors and judges, Op. cit. http://www.coe.int/t/dghl/cooperation/economiccrime/cybercrime/Documents/Electronic Evidence Guide/default_en.asp
[27] ACPO, ACPO Good Practice Guide for Digital Evidence, Op. cit., http://www.acpo.police.uk/documents/crime/2011/201110-cba-digital-evidence-v5.pdf
[28] Book: Digital Evidence and Computer Crime, 2nd Edition, Authors: Eoghan Casey, eBook ISBN: 9780080472508, Imprint: Academic Press, Published Date: 23rd February 2004. https://www.elsevier.com/books/digital-evidence-and-computer-crime/casey/978-0-08-047250-8
[29] ACPO, ACPO Good Practice Guide for Digital Evidence, Op. cit., p. 6. http://www.acpo.police.uk/documents/crime/2011/201110-cba-digital-evidence-v5.pdf
[30] ACPO, ACPO Good Practice Guide for Digital Evidence, Op. cit., p. 6. http://www.acpo.police.uk/documents/crime/2011/201110-cba-digital-evidence-v5.pdf
[31] Report: NIST Cloud Computing Forensic Science Challenges. Draft NISTIR 8006, National Institute of Standards and Technology (NIST), Interagency or Internal Report 8006, 51 pages (June 2014). Comments on this publication may be submitted to: Michaela Iorga. https://csrc.nist.gov/csrc/media/publications/nistir/8006/draft/documents/draft_nistir_8006.pdf
Keywords
Cloud forensics, Digital forensics; Forensics; Cloud computing forensics; Forensic Science; Forensics challenges