Legal Challenges in Cloud Forensics Completed Research

被引:0
作者
Marshall, Kate [1 ]
Rea, Alan [1 ]
机构
[1] Western Michigan Univ, Kalamazoo, MI 49008 USA
来源
DIGITAL INNOVATION AND ENTREPRENEURSHIP (AMCIS 2021) | 2021年
关键词
Cloud forensics; digital forensic investigations; legal challenges; cloud service providers;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the cloud landscape and its number of users continues to grow, so does the amount of criminal activity and evidence on and in the cloud. The need for capable cloud forensic investigations is increasing; however, owing to the slow pace of legal systems compared with the inherent rapidity of technological change, the field of Cloud Forensics is faced with many legal issues and challenges, including blurred jurisdictional boundaries; lack of physical access to media; admissibility of evidence; data ownership uncertainties; and weak chain of custody proofs. The bulk of the research focuses not on technical challenges, but on cloud computing and its associated legal challenges. It sheds light on these legal issues by exploring and identifying legal challenges and lacking existence of standards for cloud forensic investigations. To alleviate difficulties faced in cloud forensic investigations, multiple recommendations are offered.
引用
收藏
页数:10
相关论文
共 50 条
[31]   Cloud Forensics: Evidence Collection and Preliminary Analysis [J].
Saibharath, S. ;
Geethakumari, G. .
2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, :464-467
[32]   Secure Logging Monitor Service for Cloud Forensics [J].
Wu, Songyang ;
Zhang, Yong .
2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, :757-762
[33]   Towards a practical cloud forensics logging framework [J].
Pichan, Ameer ;
Lazarescu, Mihai ;
Soh, Sie Teng .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 :18-28
[34]   Cloud Forensics-A Framework for Investigating Cyber Attacks in Cloud Environment [J].
Manoj, Sheik Khadar Ahmad ;
Bhaskari, D. Lalitha .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 :149-154
[35]   Forensics-as-a-Service for Mobile Cloud Environment [J].
Roy, Asmita ;
Midya, Sadip ;
Majumder, Koushik ;
Phadikar, Santanu .
2018 FOURTH IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2018, :6-11
[36]   Cloud storage forensics: MEGA as a case study [J].
Daryabar, Farid ;
Dehghantanha, Ali ;
Choo, Kim-Kwang Raymond .
AUSTRALIAN JOURNAL OF FORENSIC SCIENCES, 2017, 49 (03) :344-357
[37]   SUGGESTIONS TO DIGITAL FORENSICS IN CLOUD COMPUTING ERA [J].
Chen, Guangxuan ;
Nu, Yanhui ;
Qin, Panke ;
Du, Jin .
PROCEEDINGS OF THE 3RD IEEE INTERNATIONAL CONFERENCE ON NETWORK INFRASTRUCTURE AND DIGITAL CONTENT (IEEE IC-NIDC 2012), 2012, :540-544
[38]   A STATE-OF-THE-ART REVIEW OF CLOUD FORENSICS [J].
Almulla, Sameera ;
Iraqi, Youssef ;
Jones, Andrew .
JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2014, 9 (04) :7-28
[39]   A Survey of Various Frameworks and Solutions in all Branches of Digital Forensics with a Focus on Cloud Forensics [J].
Khanafseh, Mohammed ;
Qatawneh, Mohammad ;
Almobaideen, We Sam .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (08) :610-629
[40]   Fog Computing: Issues and Challenges in Security and Forensics [J].
Wang, Yifan ;
Uehara, Tetsutaro ;
Sasaki, Ryoichi .
IEEE 39TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC 2015), VOL 3, 2015, :53-59