An insight into cloud forensic readiness by leading cloud service providers: a survey

被引:1
作者
Sanda, Pranitha [1 ,2 ]
Pawar, Digambar [1 ]
Radha, V [2 ]
机构
[1] Univ Hyderabad, Sch Comp & Informat Sci, Hyderabad, India
[2] Inst Dev & Res Banking Technol, Ctr Cloud Comp, Hyderabad, India
关键词
Digital forensics; Cloud forensics; Log forensics; Disk forensics; Memory forensics; Cloud service providers; TECHNICAL CHALLENGES;
D O I
10.1007/s00607-022-01077-2
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In today's digital world, it is hard to imagine the Information Technology field without cloud computing as it saves millions of dollars every year and enables it to focus on its core business rather than on managing complex computing infrastructure. However, the adoption of the cloud opens the window for cloud crimes. Hence, cloud forensics is the need of the hour. Law Enforcement Agencies (LEAs) have to depend on Cloud Service Providers (CSPs) for investigating cloud crimes. Unfortunately, the LEAs are not aware of the forensic procedures implemented by the CSPs, nor are the details corresponding to forensic procedures are properly documented by the CSPs. This paper aims to study the forensic readiness of the leading CSPs and present their forensic workflow. We also compared these CSPs against various parameters based on the cloud services provisioned by them for forensics. The recent research published in this domain lists the challenges of cloud forensics and describes the proposed solutions. However, the current forensic procedures implemented by the leading CSPs have not been detailed in any of these papers. Thus, we believe that this survey would help the LEAs, forensic experts, security analysts, and first incident responders with an insight on the current forensic procedures implemented by the leading CSPs and help them in their investigation, designing standard operating procedures, etc.
引用
收藏
页码:2005 / 2030
页数:26
相关论文
共 28 条
[1]  
[Anonymous], 2011, P IFIP INT C DIG FOR, DOI DOI 10.1007/978-3-642-24212-03
[2]  
Assaf, 2017, PROTECT DATA REST AM
[3]  
BarryConway MA, 2019, AUTOMATED FORENSICS
[4]  
BenRidgway FS, 2016, MICROSOFT AZURE SECU
[5]  
Brian W, 2019, AZURE MONITOR OVERVI
[6]  
Brian W, 2020, MANAGE USAGE COSTS A
[7]  
Brian W, 2021, REV AZURE MONITOR AG
[8]  
Dykstra J., 2011, UNDERSTANDING ISSUES
[9]   Digital forensics research: The next 10 years [J].
Garfinkel, Simson L. .
DIGITAL INVESTIGATION, 2010, 7 :S64-S73
[10]  
Google, 2021, GOOGL TRANSP REP