Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results
Ruan K., Carthy J., Kechadi T., Baggili I. Digital Investigation: The International Journal of Digital Forensics & Incident Response10 (1):34-43,2013.Type:Article
Date Reviewed: Dec 15 2014

Cloud computing has gained significant momentum over the last two-to-three years. It provides an attractive solution to outsource data storage and processing, allowing businesses and organizations to concentrate on their core strengths. However, cloud computing provides a dilemma for digital forensics investigations. Such investigations require direct access to computing devices, storage, and other potential sources of digital evidence, which are not readily available in cloud environments. This paper describes the results of a survey that was completed by digital forensic experts and practitioners to highlight the “key fundamental issues of cloud forensics.”

After describing the organization of the survey and considering the questions asked, the authors present an analysis of the responses. The survey questions are arranged into three groups: (1) definitions, (2) challenges and opportunities, and (3) procedures, tools, and policies. The survey is a little slow getting started with basic definitions, but picks up in groups (2) and (3) to consider the more important issues.

It is important that any consideration of cloud forensics considers both sides of the coin in that clouds can provide a dilemma to forensics investigations, but they can also assist such investigations (having all of the digital evidence in one place can be advantageous). The paper does do justice to these alternative viewpoints.

The final sections provide useful insight into current research and development and future ideas, in particular, the concept of forensics-as-a-service.

Digital forensics has risen to address previous challenges, such as mobile and wireless technology, encryption, and live memory analysis. I have no doubt that digital forensics will rise to the challenges of cloud computing. This paper provides useful background information to help address this challenge.

Reviewer:  Denis Reilly Review #: CR143009 (1504-0288)
Bookmark and Share
 
Cloud Computing (C.2.4 ... )
 
 
Abuse And Crime Involving Computers (K.4.1 ... )
 
 
Security and Protection (C.2.0 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Cloud Computing": Date
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (1 of 3)
Dec 14 2009
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (2 of 3)
Jan 26 2010
Cloud security and privacy: an enterprise perspective on risks and compliance
Mather T., Kumaraswamy S., Latif S., O’Reilly Media, Inc., Sebastopol, CA, 2009.  336, Type: Book (9780596802769), Reviews: (3 of 3)
Mar 18 2010
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy