Cloud incident handling and forensic-by-design: cloud storage as a case study

被引:37
作者
Ab Rahman, Nurul Hidayah [1 ,2 ]
Cahyani, Niken Dwi Wahyu [1 ,3 ]
Choo, Kim-Kwang Raymond [1 ]
机构
[1] Univ South Australia, Informat Assurance Res Grp, Adelaide, SA, Australia
[2] Univ Tun Hussein Onn Malaysia, Fac Comp Sci & Informat Technol, Parit Raja, Johor, Malaysia
[3] Telkom Univ, Informat Dept, Bandung, Indonesia
关键词
cloud computing; cloud storage forensics; digital forensics; forensic-by-design; incident handling; mobile forensics; FRAMEWORK;
D O I
10.1002/cpe.3868
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Information security incident handling strategies or models are important to ensure the security of organisations, particularly in cloud and big data environments. However, existing strategies or models may not adequate as cloud data are generally virtualised, geographically distributed and ephemeral, presenting both technical and jurisdictional challenges. We present an integrated cloud incident handling and forensic-by-design model. We then seek to validate the model using a set of controlled experiments on a cloud-related incident. Three popular cloud storage applications were deployed namely, Dropbox, Google Drive, and OneDrive. This study demonstrates the utility of the model for organisational cloud users to undertake incident investigations (e.g. collect and analyse residual data from cloud storage applications). Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页数:16
相关论文
共 39 条
[1]  
Ab Rahman N. H., 2015, 2015 AM C INF SYST A
[2]   Forensic-by-Design Framework for Cyber-Physical Cloud Systems [J].
Ab Rahman, Nurul Hidayah ;
Glisson, William Bradley ;
Yang, Yanjiang ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2016, 3 (01) :50-59
[3]   A survey of information security incident handling in the cloud [J].
Ab Rahman, Nurul Hidayah ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2015, 49 :45-69
[4]  
Amazon Web Services (AWS), 2016, SHAR RESP MOD
[5]  
[Anonymous], 2015, CLOUD SECURITY ECOSY, DOI DOI 10.1016/B9780-12801595-7.00015X
[6]  
[Anonymous], CLOUD SECURITY ECOSY
[7]  
[Anonymous], 2013, P 2013 9 INT C INN I
[8]  
[Anonymous], 2011, USENIX SEC S
[9]  
Balduzzi Marco., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1427, DOI DOI 10.1145/2245276.2232005
[10]   A hierarchical, objectives-based framework for the digital investigations process [J].
Beebe, Nicole Lang ;
Clark, Jan Guynes .
DIGITAL INVESTIGATION, 2005, 2 (02) :147-167