Forensics investigation challenges in cloud computing environments
Cloud computing discusses about sharing any imaginable entity such as process units, storage devices or software. The provided service is utterly economical and expandable. Cloud computing attractive benefits entice huge interest of both business owners and cyber thefts. Consequently, the “computer...
| Main Authors: | , , , |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/69135/ http://psasir.upm.edu.my/id/eprint/69135/1/Forensics%20investigation%20challenges%20in%20cloud%20computing%20environments.pdf |
| _version_ | 1848856321529479168 |
|---|---|
| author | Damshenas, Mohsen Dehghantanha, Ali Mahmod, Ramlan Shamsuddin, Solahuddin |
| author_facet | Damshenas, Mohsen Dehghantanha, Ali Mahmod, Ramlan Shamsuddin, Solahuddin |
| author_sort | Damshenas, Mohsen |
| building | UPM Institutional Repository |
| collection | Online Access |
| description | Cloud computing discusses about sharing any imaginable entity such as process units, storage devices or software. The provided service is utterly economical and expandable. Cloud computing attractive benefits entice huge interest of both business owners and cyber thefts. Consequently, the “computer forensic investigation” step into the play to find evidences against criminals. As a result of the new technology and methods used in cloud computing, the forensic investigation techniques face different types of issues while inspecting the case. The most profound challenges are difficulties to deal with different rulings obliged on variety of data saved in different locations, limited access to obtain evidences from cloud and even the issue of seizing the physical evidence for the sake of integrity validation or evidence presentation. This paper suggests a simple yet very useful solution to conquer the aforementioned issues in forensic investigation of cloud systems. Utilizing TPM in hypervisor, implementing multi-factor authentication and updating the cloud service provider policy to provide persistent storage devices are some of the recommended solutions. Utilizing the proposed solutions, the cloud service will be compatible to the current digital forensic investigation practices; alongside it brings the great advantage of being investigable and consequently the trust of the client. |
| first_indexed | 2025-11-15T11:39:48Z |
| format | Conference or Workshop Item |
| id | upm-69135 |
| institution | Universiti Putra Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T11:39:48Z |
| publishDate | 2012 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | upm-691352019-06-12T07:35:30Z http://psasir.upm.edu.my/id/eprint/69135/ Forensics investigation challenges in cloud computing environments Damshenas, Mohsen Dehghantanha, Ali Mahmod, Ramlan Shamsuddin, Solahuddin Cloud computing discusses about sharing any imaginable entity such as process units, storage devices or software. The provided service is utterly economical and expandable. Cloud computing attractive benefits entice huge interest of both business owners and cyber thefts. Consequently, the “computer forensic investigation” step into the play to find evidences against criminals. As a result of the new technology and methods used in cloud computing, the forensic investigation techniques face different types of issues while inspecting the case. The most profound challenges are difficulties to deal with different rulings obliged on variety of data saved in different locations, limited access to obtain evidences from cloud and even the issue of seizing the physical evidence for the sake of integrity validation or evidence presentation. This paper suggests a simple yet very useful solution to conquer the aforementioned issues in forensic investigation of cloud systems. Utilizing TPM in hypervisor, implementing multi-factor authentication and updating the cloud service provider policy to provide persistent storage devices are some of the recommended solutions. Utilizing the proposed solutions, the cloud service will be compatible to the current digital forensic investigation practices; alongside it brings the great advantage of being investigable and consequently the trust of the client. IEEE 2012 Conference or Workshop Item PeerReviewed text en http://psasir.upm.edu.my/id/eprint/69135/1/Forensics%20investigation%20challenges%20in%20cloud%20computing%20environments.pdf Damshenas, Mohsen and Dehghantanha, Ali and Mahmod, Ramlan and Shamsuddin, Solahuddin (2012) Forensics investigation challenges in cloud computing environments. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 26-28 June 2012, Kuala Lumpur, Malaysia. (pp. 190-194). 10.1109/CyberSec.2012.6246092 |
| spellingShingle | Damshenas, Mohsen Dehghantanha, Ali Mahmod, Ramlan Shamsuddin, Solahuddin Forensics investigation challenges in cloud computing environments |
| title | Forensics investigation challenges in cloud computing environments |
| title_full | Forensics investigation challenges in cloud computing environments |
| title_fullStr | Forensics investigation challenges in cloud computing environments |
| title_full_unstemmed | Forensics investigation challenges in cloud computing environments |
| title_short | Forensics investigation challenges in cloud computing environments |
| title_sort | forensics investigation challenges in cloud computing environments |
| url | http://psasir.upm.edu.my/id/eprint/69135/ http://psasir.upm.edu.my/id/eprint/69135/ http://psasir.upm.edu.my/id/eprint/69135/1/Forensics%20investigation%20challenges%20in%20cloud%20computing%20environments.pdf |