Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques

被引:123
作者
Dykstra, Josiah [1 ]
Sherman, Alan T. [1 ]
机构
[1] Univ Maryland Baltimore Cty, Dept CSEE, Cyber Def Lab, Baltimore, MD 21250 USA
基金
美国国家科学基金会;
关键词
Computer security; Cloud computing; Digital forensics; Cloud forensics; EnCase; FTK; Amazon EC2;
D O I
10.1016/j.diin.2012.05.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We expose and explore technical and trust issues that arise in acquiring forensic evidence from infrastructure-as-a-service cloud computing and analyze some strategies for addressing these challenges. First, we create a model to show the layers of trust required in the cloud. Second, we present the overarching context for a cloud forensic exam and analyze choices available to an examiner. Third, we provide for the first time an evaluation of popular forensic acquisition tools including Guidance EnCase and AccesData Forensic Toolkit, and show that they can successfully return volatile and non-volatile data from the cloud. We explain, however, that with those techniques judge and jury must accept a great deal of trust in the authenticity and integrity of the data from many layers of the cloud model. In addition, we explore four other solutions for acquisition Trusted Platform Modules, the management plane, forensics-as-a-service, and legal solutions, which assume less trust but require more cooperation from the cloud service provider. Our work lays a foundation for future development of new acquisition methods for the cloud that will be trustworthy and forensically sound. Our work also helps forensic examiners, law enforcement, and the court evaluate confidence in evidence from the cloud. (c) 2012 Dykstra & Sherman. Published by Elsevier Ltd. All rights reserved.
引用
收藏
页码:S90 / S98
页数:9
相关论文
共 30 条
[1]  
Amazon Web Services, 2011, AWS IMP EXP
[2]  
[Anonymous], ADV DIGITAL FORENSIC
[3]  
[Anonymous], 2003, P NETW DISTR SYST SE
[4]  
Casey Eoghan., 2004, DIGITAL EVIDENCE COM, V2nd
[5]  
Conover M, 2008, P BLACKH US
[6]  
Dolan-Gabitt B, 2011, INERT1989 ROC
[7]  
DYKSTRA J., 2011, J NETWORK FORENSICS, V3, P19
[8]  
DYKSTRA J., 2011, Proceedings of the 2011 ADFSL Conference on Digital Forensics Security and Law, P191
[9]  
Eucalyptus, 2011, EUC OP SOURC CLOUD P
[10]  
Federal CIO Council, 2011, GUID SEC US CLOUD CO