Skip to main content
Top

2016 | OriginalPaper | Chapter

A Meta-model for Assisting a Cloud Forensics Process

Authors : Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis

Published in: Risks and Security of Internet and Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cloud forensics introduce processes for resolving incidents occurring in cloud computing environments. However, designing cloud services capable to assist a cloud investigation process is of vital importance and recent research efforts concentrate on these directions. In addition, digital forensics methods cannot support a cloud investigation since cloud environments introduce many differences compared to traditional IT environments. This paper moves current research one step further by identifying the major concepts, actors and their relationships that participating in a cloud forensics process through the introduction of a new meta-model. The paper presents a running example as well for better understanding the suggested concepts.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Kalloniatis, C., Mouratidis, H., Manousakis, V., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput. Stand. Interfaces 36(4), 759–775 (2014). ElsevierCrossRef Kalloniatis, C., Mouratidis, H., Manousakis, V., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: identifying the major concepts. Comput. Stand. Interfaces 36(4), 759–775 (2014). ElsevierCrossRef
2.
go back to reference Manousakis, V., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Privacy in the cloud: bridging the gap between design and implementation. In: Franch, X., Soffer, P. (eds.) CAiSE Workshops 2013. LNBIP, vol. 148, pp. 455–465. Springer, Heidelberg (2013)CrossRef Manousakis, V., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Privacy in the cloud: bridging the gap between design and implementation. In: Franch, X., Soffer, P. (eds.) CAiSE Workshops 2013. LNBIP, vol. 148, pp. 455–465. Springer, Heidelberg (2013)CrossRef
3.
go back to reference Kalloniatis, C., Manousakis, V., Mouratidis, H., Gritzalis, S.: Migrating into the cloud: identifying the major security and privacy concerns. In: Douligeris, C., Polemi, N., Karantjias, A., Lamersdorf, W. (eds.) Collaborative, Trusted and Privacy-Aware e/m-Services. IFIP AICT, vol. 399, pp. 73–87. Springer, Heidelberg (2013)CrossRef Kalloniatis, C., Manousakis, V., Mouratidis, H., Gritzalis, S.: Migrating into the cloud: identifying the major security and privacy concerns. In: Douligeris, C., Polemi, N., Karantjias, A., Lamersdorf, W. (eds.) Collaborative, Trusted and Privacy-Aware e/m-Services. IFIP AICT, vol. 399, pp. 73–87. Springer, Heidelberg (2013)CrossRef
4.
go back to reference Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: an overview. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics VII. IFIP AICT, vol. 361, pp. 35–46. Springer, Heidelberg (2011)CrossRef Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics: an overview. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics VII. IFIP AICT, vol. 361, pp. 35–46. Springer, Heidelberg (2011)CrossRef
5.
go back to reference NIST. In: Group CFSW. NIST Cloud Computing Forensic Science Challenges (Draft NISTIR 8006). NIST Publication (2014) NIST. In: Group CFSW. NIST Cloud Computing Forensic Science Challenges (Draft NISTIR 8006). NIST Publication (2014)
6.
go back to reference Martini, B., Choo, K.-K.R.: An integrated conceptual digital forensic framework for cloud computing. Digital Invest. 9(2), 71–80 (2012)CrossRef Martini, B., Choo, K.-K.R.: An integrated conceptual digital forensic framework for cloud computing. Digital Invest. 9(2), 71–80 (2012)CrossRef
7.
go back to reference Adams, R.: The emergence of cloud storage and the need for a new digital forensic process model. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 79–104. IGI Global, Hershey (2013)CrossRef Adams, R.: The emergence of cloud storage and the need for a new digital forensic process model. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 79–104. IGI Global, Hershey (2013)CrossRef
8.
go back to reference Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud forensics: identifying the major issues and challenges. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 271–284. Springer, Heidelberg (2014) Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud forensics: identifying the major issues and challenges. In: Jarke, M., Mylopoulos, J., Quix, C., Rolland, C., Manolopoulos, Y., Mouratidis, H., Horkoff, J. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 271–284. Springer, Heidelberg (2014)
9.
go back to reference Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud forensics solutions: a review. In: Iliadis, L., Papazoglou, M., Pohl, K. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 299–309. Springer, Heidelberg (2014) Simou, S., Kalloniatis, C., Kavakli, E., Gritzalis, S.: Cloud forensics solutions: a review. In: Iliadis, L., Papazoglou, M., Pohl, K. (eds.) CAiSE 2014. LNCS, vol. 8484, pp. 299–309. Springer, Heidelberg (2014)
10.
go back to reference Zawoad, S., Hasan, R.: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv preprint, arXiv:1302.6312 (2013) Zawoad, S., Hasan, R.: Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems. arXiv preprint, arXiv:​1302.​6312 (2013)
11.
go back to reference Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), May 2011, pp. 1–10. IEEE (2011) Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), May 2011, pp. 1–10. IEEE (2011)
12.
go back to reference Mishra, A.K., Matta, P., Pilli, E.S., Joshi, R.C.: Cloud forensics: state-of-the-art and research challenges. In: 2012 International Symposium on Cloud and Services Computing (ISCOS), December 2012, pp. 164–170. IEEE (2012) Mishra, A.K., Matta, P., Pilli, E.S., Joshi, R.C.: Cloud forensics: state-of-the-art and research challenges. In: 2012 International Symposium on Cloud and Services Computing (ISCOS), December 2012, pp. 164–170. IEEE (2012)
13.
go back to reference Aydin, M., Jacob, J.: A comparison of major issues for the development of forensics in cloud computing. In: 2013 8th International Conference on Information Science and Technology (ICIST), pp. 77–82. IEEE (2013) Aydin, M., Jacob, J.: A comparison of major issues for the development of forensics in cloud computing. In: 2013 8th International Conference on Information Science and Technology (ICIST), pp. 77–82. IEEE (2013)
14.
go back to reference Zargari, S., Benford, D.: Cloud forensics: concepts, issues, and challenges. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), September 2012, pp. 236–243. IEEE (2012) Zargari, S., Benford, D.: Cloud forensics: concepts, issues, and challenges. In: 2012 Third International Conference on Emerging Intelligent Data and Web Technologies (EIDWT), September 2012, pp. 236–243. IEEE (2012)
15.
go back to reference Palmer, G.: A road map for digital forensic research - report from the first Digital Forensics Research Workshop (DFRWS). Paper presented at the First Digital Forensic Research Workshop, Utica, NY, USA, pp. 1–48 (2001) Palmer, G.: A road map for digital forensic research - report from the first Digital Forensics Research Workshop (DFRWS). Paper presented at the First Digital Forensic Research Workshop, Utica, NY, USA, pp. 1–48 (2001)
16.
go back to reference Reith, M., Carr, C., Gunsch, C.: An examination of digital forensic models. Int. J. Digital Evid. 1(3), 1–12 (2002). Fall Reith, M., Carr, C., Gunsch, C.: An examination of digital forensic models. Int. J. Digital Evid. 1(3), 1–12 (2002). Fall
17.
go back to reference Ciardhuáin, S.Ó.: An extended model of cybercrime investigations. Int. J. Digital Evid. 3(1), 1–22 (2004). Summer Ciardhuáin, S.Ó.: An extended model of cybercrime investigations. Int. J. Digital Evid. 3(1), 1–22 (2004). Summer
18.
go back to reference Carrier, B., Spafford, E.H.: Getting physical with the digital investigation process. Int. J. Digital Evid. 2(2), 1–20 (2003). Fall Carrier, B., Spafford, E.H.: Getting physical with the digital investigation process. Int. J. Digital Evid. 2(2), 1–20 (2003). Fall
19.
go back to reference Pooe, A., Labuschagne, L.: A conceptual model for digital forensic readiness. In: Information Security for South Africa (ISSA), pp. 1–8. IEEE (2012) Pooe, A., Labuschagne, L.: A conceptual model for digital forensic readiness. In: Information Security for South Africa (ISSA), pp. 1–8. IEEE (2012)
20.
go back to reference Al-Fedaghi, S., Al-Babtain, B.: Modeling the forensics process. Int. J. Secur. Appl. 6(4), 97–108 (2012) Al-Fedaghi, S., Al-Babtain, B.: Modeling the forensics process. Int. J. Secur. Appl. 6(4), 97–108 (2012)
21.
go back to reference Ruan, K., Carthy, J.: Cloud computing reference architecture and its forensic implications: a preliminary analysis. In: Rogers, M., Seigfried-Spellar, K.C. (eds.) ICDF2C 2012. LNICST, vol. 114, pp. 1–21. Springer, Heidelberg (2013)CrossRef Ruan, K., Carthy, J.: Cloud computing reference architecture and its forensic implications: a preliminary analysis. In: Rogers, M., Seigfried-Spellar, K.C. (eds.) ICDF2C 2012. LNICST, vol. 114, pp. 1–21. Springer, Heidelberg (2013)CrossRef
22.
go back to reference von Solms, S., Louwrens, C., Reekie, C., Grobler, T.: A control framework for digital forensics. In: Olivier, M.S., Shenoi, S. (eds.) Advances in Digital Forensics II. IFIP AICT, vol. 222, pp. 343–355. Springer, New York (2006)CrossRef von Solms, S., Louwrens, C., Reekie, C., Grobler, T.: A control framework for digital forensics. In: Olivier, M.S., Shenoi, S. (eds.) Advances in Digital Forensics II. IFIP AICT, vol. 222, pp. 343–355. Springer, New York (2006)CrossRef
23.
go back to reference Selamat, S.R., Yusof, R., Sahib, S.: Mapping process of digital forensic investigation framework. Int. J. Comput. Sci. Netw. Secur. 8(10), 163–169 (2008) Selamat, S.R., Yusof, R., Sahib, S.: Mapping process of digital forensic investigation framework. Int. J. Comput. Sci. Netw. Secur. 8(10), 163–169 (2008)
24.
go back to reference Orton, I., Alva, A., Endicott-Popovsky, B.: Legal process and requirements for cloud forensic investigations. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 186–229. IGI Global, Hershey (2012) Orton, I., Alva, A., Endicott-Popovsky, B.: Legal process and requirements for cloud forensic investigations. In: Ruan, K. (ed.) Cybercrime and Cloud Forensics: Applications for Investigation Processes, pp. 186–229. IGI Global, Hershey (2012)
25.
go back to reference Beebe, N.L., Clark, J.G.: A hierarchical, objectives-based framework for the digital investigations process. Digital Invest. Int. J. Digital Forensics Incident Response 2(2), 147–167 (2005) Beebe, N.L., Clark, J.G.: A hierarchical, objectives-based framework for the digital investigations process. Digital Invest. Int. J. Digital Forensics Incident Response 2(2), 147–167 (2005)
26.
go back to reference Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., Leaf, D.: NIST cloud computing reference architecture. NIST Special Publication-500, p. 292 (2011) Liu, F., Tong, J., Mao, J., Bohn, R., Messina, J., Badger, L., Leaf, D.: NIST cloud computing reference architecture. NIST Special Publication-500, p. 292 (2011)
27.
go back to reference Grispos, G., Storer, T., Glisson, W.B.: Calm before the storm: the challenges of cloud. In: Li, C.T. (ed.) Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, pp. 211–233. IGI Global, Hershey (2013)CrossRef Grispos, G., Storer, T., Glisson, W.B.: Calm before the storm: the challenges of cloud. In: Li, C.T. (ed.) Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, pp. 211–233. IGI Global, Hershey (2013)CrossRef
28.
go back to reference Dykstra, J., Sherman, A.T.: Understanding issues in cloud forensics: two hypothetical case studies. In: Proceedings of the Conference on Digital Forensics, Security and Law, Richmond, Virginia, USA, pp. 45–54 (2011) Dykstra, J., Sherman, A.T.: Understanding issues in cloud forensics: two hypothetical case studies. In: Proceedings of the Conference on Digital Forensics, Security and Law, Richmond, Virginia, USA, pp. 45–54 (2011)
Metadata
Title
A Meta-model for Assisting a Cloud Forensics Process
Authors
Stavros Simou
Christos Kalloniatis
Haralambos Mouratidis
Stefanos Gritzalis
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-31811-0_11

Premium Partner