A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
Ting Sang
Shanghai Jiao Tong University, Shanghai, 200240, China. saintogod@gmail.com In this paper I will focus on analyzing challenge for forensic investigation in cloud environments. The rest paper is organized as following. In section II, I will show what cloud computing and digital forensics is. And the next section is about the challenges that introduced by cloud computing to digital forensic. I will show a model that can make the cloud computing friendlier to digital forensics in section IV. At last, in section V, a conclusion is given.
Abstract-Cloud computing is getting more and more attention from the information and communication technologies industry recently. Almost all the leading companies of the information area show their interesting and efforts on cloud computing and release services about cloud computing in succession. But if want to make it go further, we should pay more effort on security issues. Especially, the Internet environment now has become more and more unsecure. With the popularization of computers and intelligent devices, the number of crime on them has increased rapidly in last decades, and will be quicker on the cloud computing environment in future. No wall is wall in the world. We should enhance the cloud computing not only at the aspect of precaution, but also at the aspect of dealing with the security events to defend it from crime activities. In this paper, I propose a approach which using logs model to building a forensic-friendly system.
Using this model we can quickly gather information from cloud computing for some kinds of forensic purpose. And this will decrease the complexity of those kinds of forensics.
II.
A. Cloud Computing
In this era of globalization, concentrating is the only way to success for the small
References: archiving. RFC 3227, IETF, 2002. Systematic Approaches to Digital Forensic Engineering (SADFE), pages: 1-10, 2011. Technologies (HONET), pages: 190-195, 2010. Management and IT Forensics, pages: 3-9, 2009. Cheng Yan, Cybercrime forensic system in cloud computing, Image Analysis and Signal Processing (IASP), pages: 612-615, 2011. Technology and Secured Transactions, pages: 1-6, 2009. International Conference on Computer Science and Information Processing (CSIP), pages: 248-251, 2012.