Show simple item record

dc.contributor.authorAlqahtany, Sen
dc.contributor.authorClarke, Nen
dc.contributor.authorFurnell, Sen
dc.contributor.authorReich, Cen
dc.date.accessioned2016-03-24T13:25:04Z
dc.date.available2016-03-24T13:25:04Z
dc.date.issued2016-03-01en
dc.identifier.issn1386-7857en
dc.identifier.urihttp://hdl.handle.net/10026.1/4423
dc.description.abstract

Cloud computing is a promising next-generation computing paradigm that offers significant economic benefits to both commercial and public entities. Furthermore, cloud computing provides accessibility, simplicity, and portability for its customers. Due to the unique combination of characteristics that cloud computing introduces (including on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service), digital investigations face various technical, legal, and organizational challenges to keep up with current developments in the field of cloud computing. There are a wide variety of issues that need to be resolved in order to perform a proper digital investigation in the cloud environment. This paper examines the challenges in cloud forensics that are identified in the current research literature, alongside exploring the existing proposals and technical solutions addressed in the respective research. The open problems that need further effort are highlighted. As a result of the analysis of literature, it is found that it would be difficult, if not impossible, to perform an investigation and discovery in the cloud environment without relying on cloud service providers (CSPs). Therefore, dependence on the CSPs is ranked as the greatest challenge when investigators need to acquire evidence in a timely yet forensically sound manner from cloud systems. Thus, a fully independent model requires no intervention or cooperation from the cloud provider is proposed. This model provides a different approach to a forensic acquisition and analysis system (FAAS) in an Infrastructure as a Service model. FAAS seeks to provide a richer and more complete set of admissible evidences than what current CSPs provide, with no requirement for CSP involvement or modification to the CSP’s underlying architecture.

en
dc.format.extent439 - 453en
dc.language.isoenen
dc.titleA forensic acquisition and analysis system for IaaSen
dc.typeJournal Article
plymouth.issue1en
plymouth.volume19en
plymouth.publication-statusPublisheden
plymouth.journalCluster Computingen
dc.identifier.doi10.1007/s10586-015-0509-xen
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
plymouth.organisational-group/Plymouth/Users by role/Professional Services staff
dc.identifier.eissn1573-7543en
dc.rights.embargoperiod12 monthsen
rioxxterms.versionofrecord10.1007/s10586-015-0509-xen
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/under-embargo-all-rights-reserveden
rioxxterms.typeJournal Article/Reviewen


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
@mire NV