An insight into cloud forensic readiness by leading cloud service providers: a survey

被引:0
作者
Pranitha Sanda
Digambar Pawar
V. Radha
机构
[1] University of Hyderabad,School of Computer and Information Sciences
[2] Centre for Cloud Computing,undefined
[3] Institute for Development and Research in Banking Technology,undefined
来源
Computing | 2022年 / 104卷
关键词
Digital forensics; Cloud forensics; Log forensics; Disk forensics; Memory forensics; Cloud service providers; 68-02;
D O I
暂无
中图分类号
学科分类号
摘要
In today’s digital world, it is hard to imagine the Information Technology field without cloud computing as it saves millions of dollars every year and enables it to focus on its core business rather than on managing complex computing infrastructure. However, the adoption of the cloud opens the window for cloud crimes. Hence, cloud forensics is the need of the hour. Law Enforcement Agencies (LEAs) have to depend on Cloud Service Providers (CSPs) for investigating cloud crimes. Unfortunately, the LEAs are not aware of the forensic procedures implemented by the CSPs, nor are the details corresponding to forensic procedures are properly documented by the CSPs. This paper aims to study the forensic readiness of the leading CSPs and present their forensic workflow. We also compared these CSPs against various parameters based on the cloud services provisioned by them for forensics. The recent research published in this domain lists the challenges of cloud forensics and describes the proposed solutions. However, the current forensic procedures implemented by the leading CSPs have not been detailed in any of these papers. Thus, we believe that this survey would help the LEAs, forensic experts, security analysts, and first incident responders with an insight on the current forensic procedures implemented by the leading CSPs and help them in their investigation, designing standard operating procedures, etc.
引用
收藏
页码:2005 / 2030
页数:25
相关论文
共 33 条
[1]  
Garfinkel SL(2010)Digital forensics research: the next 10 years Digit Investig 7 S64-S73
[2]  
Simou S(2016)A survey on cloud forensics challenges and solutions Secur Commun Netw 9 6285-6314
[3]  
Kalloniatis C(2013)Cloud forensics definitions and critical criteria for cloud forensic capability: an overview of survey results Digit Investig 10 34-43
[4]  
Gritzalis S(2014)Cloud forensic technical challenges and solutions: a snapshot IEEE Cloud Comput 1 20-25
[5]  
Mouratidis H(2019)A systematic survey on cloud forensics challenges, solutions, and future directions ACM Comput Surv (CSUR) 52 1-38
[6]  
Ruan K(2015)Cloud forensics: technical challenges, solutions and comparative analysis Digit Investig 13 38-57
[7]  
Carthy J(2016)Cloud log forensics: foundations, state of the art, and future directions ACM Comput Surv (CSUR) 49 1-42
[8]  
Kechadi T(2019)A survey on forensic investigation of operating system logs Digit Investig 29 1-20
[9]  
Baggili I(2020)User profiling via application usage pattern on digital devices for digital forensics Expert Syst Appl 168 undefined-undefined
[10]  
Martini B(undefined)undefined undefined undefined undefined-undefined