Legal Challenges in Cloud Forensics Completed Research

被引:0
作者
Marshall, Kate [1 ]
Rea, Alan [1 ]
机构
[1] Western Michigan Univ, Kalamazoo, MI 49008 USA
来源
DIGITAL INNOVATION AND ENTREPRENEURSHIP (AMCIS 2021) | 2021年
关键词
Cloud forensics; digital forensic investigations; legal challenges; cloud service providers;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the cloud landscape and its number of users continues to grow, so does the amount of criminal activity and evidence on and in the cloud. The need for capable cloud forensic investigations is increasing; however, owing to the slow pace of legal systems compared with the inherent rapidity of technological change, the field of Cloud Forensics is faced with many legal issues and challenges, including blurred jurisdictional boundaries; lack of physical access to media; admissibility of evidence; data ownership uncertainties; and weak chain of custody proofs. The bulk of the research focuses not on technical challenges, but on cloud computing and its associated legal challenges. It sheds light on these legal issues by exploring and identifying legal challenges and lacking existence of standards for cloud forensic investigations. To alleviate difficulties faced in cloud forensic investigations, multiple recommendations are offered.
引用
收藏
页数:10
相关论文
共 50 条
[41]   Towards the Development of a Cloud Forensics Methodology: A Conceptual Model [J].
Simou, Stavros ;
Kalloniatis, Christos ;
Mouratidis, Haralambos ;
Gritzalis, Stefanos .
ADVANCED INFORMATION SYSTEMS ENGINEERING WORKSHOPS, CAISE 2015, 2015, 215 :470-481
[42]   Following the breadcrumbs: Timestamp pattern identification for cloud forensics [J].
Ho, Shuyuan Mary ;
Kao, Dayu ;
Wu, Wen-Ying .
DIGITAL INVESTIGATION, 2018, 24 :79-94
[43]   A Framework for Detecting Anti-forensics in Cloud Environment [J].
Rani, Deevi Radha ;
Kumari, G. Geetha .
2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, :1277-1280
[44]   An Automated Malicious Host Recognition Model in Cloud Forensics [J].
Datta, Suchana ;
Santra, Palash ;
Majumder, Koushik ;
De, Debashis .
NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 2, 2018, 4 :61-71
[45]   ICFF: a cloud forensics framework under the IaaS model [J].
Xie, Y.-L., 1600, Editorial Board of Journal on Communications (34) :200-206
[46]   A Blockchain-based Process Provenance for Cloud Forensics [J].
Zhang, Yong ;
Wu, Songyang ;
Jin, Bo ;
Du, Jiaying .
PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, :2470-2473
[47]   Techno-Ethical Considerations: Digital Forensics in the Cloud [J].
Rogers, Corinne ;
Losavio, Michael ;
Liu, Changwei ;
Wijesekera, Duminda .
PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, :198-198
[48]   A survey on issues in cloud forensics with an experiment on time consumption [J].
Hettige, K. H. A. ;
Fernando, M. S. D. .
INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2022, 9 (03) :19-30
[49]   Toward a Conflict Resolution Protocol for Cloud Forensics Investigation [J].
Alashjaee, Abdullah Mujawib .
IEEE ACCESS, 2024, 12 :72013-72022
[50]   Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results [J].
Ruan, Keyun ;
Carthy, Joe ;
Kechadi, Tahar ;
Baggili, Ibrahim .
DIGITAL INVESTIGATION, 2013, 10 (01) :34-43