Skip to main content
Top
Published in: The Journal of Supercomputing 1/2016

01-01-2016

Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments

Author: Da-Yu Kao

Published in: The Journal of Supercomputing | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cyber offenders spread their influence as fast as the Internet and cloud computing develop. Cloud computing enhances challenges in collecting and analyzing digital evidence in a cybercrime investigation. Research on cloud storage forensics is scarce to obtain evidence or analyze metadata. This study proposes a time-based investigation in a complex cloud environment. Establishing timeline information using date-time stamps could help when the law enforcement agents investigate cloud-related crime. Some experiments are observed from three users (creator, coauthor and browser), four computers and five file operation processes (file created, file accessed, file modified, file shared, and file downloaded). This study presents a novel cybercrime investigation countermeasure using a created-accessed-modified (CAM) model to improve the effectiveness of forensic analysis. This may have implications when examiners analyze hard disks or when a user has synchronized files from a cloud account prior to computer seizure. The countermeasure methodology is potentially useful for evidentiary datasets and investigations.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Birk D, Wegener C (2001) Technical issues of forensic investigations in cloud computing environments. 6th International workshop on systematic approaches to digital forensic engineering (IEEE/SADFE). Oakland, CA, USA, pp 1–10 Birk D, Wegener C (2001) Technical issues of forensic investigations in cloud computing environments. 6th International workshop on systematic approaches to digital forensic engineering (IEEE/SADFE). Oakland, CA, USA, pp 1–10
2.
go back to reference Casey E (2010) Handbook of digital forensics and investigation. Elsevier, MA Casey E (2010) Handbook of digital forensics and investigation. Elsevier, MA
3.
go back to reference Casey E (2011) Digital evidence and computer crime: forensic science, computers, and the internet, 3rd edn. Elsevier, MA Casey E (2011) Digital evidence and computer crime: forensic science, computers, and the internet, 3rd edn. Elsevier, MA
5.
go back to reference ISO (International Organization for Standardization) (2012) ISO/IEC 27037:2012—Information technology: guidelines for identification, collection, acquisition and preservation of digital evidence. pp 1–38 ISO (International Organization for Standardization) (2012) ISO/IEC 27037:2012—Information technology: guidelines for identification, collection, acquisition and preservation of digital evidence. pp 1–38
6.
go back to reference Jing L, Bo Z (2014) The analysis of visual forensics in cloud computing environment. In: International conference on mechatronics, electronic, industrial and control engineering (MEIC 2014). Atlantis Press, pp 470–474 Jing L, Bo Z (2014) The analysis of visual forensics in cloud computing environment. In: International conference on mechatronics, electronic, industrial and control engineering (MEIC 2014). Atlantis Press, pp 470–474
7.
go back to reference Kunjan SA, Akshaya S (2014) Account and files security for multi-owners in cloud environment. Int J Comb Res Dev (IJCRD) 3(6):121–124 Kunjan SA, Akshaya S (2014) Account and files security for multi-owners in cloud environment. Int J Comb Res Dev (IJCRD) 3(6):121–124
8.
go back to reference Laykin E (2013) Investigative computer forensics: the practical guide for lawyers, accountants, investigators, and business executives. Wiley, New JerseyCrossRef Laykin E (2013) Investigative computer forensics: the practical guide for lawyers, accountants, investigators, and business executives. Wiley, New JerseyCrossRef
9.
go back to reference Quick D, Choo KKR (2013) Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digit Investig 10:266–277CrossRef Quick D, Choo KKR (2013) Forensic collection of cloud storage data: does the act of collection result in changes to the data or its metadata? Digit Investig 10:266–277CrossRef
10.
go back to reference Reilly D, Wren C, Berry T (2011) Cloud computing: pros and cons for computer forensic investigations. Int J Multimed Image Process (IJMIP) 1:26–34 Reilly D, Wren C, Berry T (2011) Cloud computing: pros and cons for computer forensic investigations. Int J Multimed Image Process (IJMIP) 1:26–34
11.
go back to reference Roger AE, Achille MM (2012) Multi-perspective cybercrime investigation process modeling. Int J Appl Inf Syst (IJAIS) 2:14–20 Roger AE, Achille MM (2012) Multi-perspective cybercrime investigation process modeling. Int J Appl Inf Syst (IJAIS) 2:14–20
12.
go back to reference Ruan K, Carthy J, Kechadi T, Crosbie M (2011) Cloud forensics. In: 7th IFIP WG 11.9 International conference on digital forensics—advances in digital forensics VII, Springer, Heidelberg, pp 35–46 Ruan K, Carthy J, Kechadi T, Crosbie M (2011) Cloud forensics. In: 7th IFIP WG 11.9 International conference on digital forensics—advances in digital forensics VII, Springer, Heidelberg, pp 35–46
13.
go back to reference Shema M (2014) Anti-hacker tool kit, 4th edn. McGraw-Hill Education Publisher, New York Shema M (2014) Anti-hacker tool kit, 4th edn. McGraw-Hill Education Publisher, New York
14.
go back to reference Shetty J, Anala MR, Shobha G (2014) A study on cloud forensics: challenges, tools and CSP features. Biom Bioinform 6(6):149–153 Shetty J, Anala MR, Shobha G (2014) A study on cloud forensics: challenges, tools and CSP features. Biom Bioinform 6(6):149–153
15.
go back to reference Shirkhedkar D, Patil S (2014) Design of digital forensic technique for cloud computing. Int J Adv Res Comput Sci Manag Stud 6(2):192–194 Shirkhedkar D, Patil S (2014) Design of digital forensic technique for cloud computing. Int J Adv Res Comput Sci Manag Stud 6(2):192–194
16.
go back to reference Simou S, Kalloniatis C, Kavakli E, Gritzalis S (2014) Cloud forensics: identifying the major issues and challenge. Advanced Information Systems Engineering, Lecture Notes in Computer Science 8484:271–284 Simou S, Kalloniatis C, Kavakli E, Gritzalis S (2014) Cloud forensics: identifying the major issues and challenge. Advanced Information Systems Engineering, Lecture Notes in Computer Science 8484:271–284
17.
go back to reference Sommer P (2012) Digital evidence, digital investigations and e-disclosure: a guide to forensic readiness for organizations, security advisers and lawyers (third edition). Information assurance advisory council (IAAC), Swindon, UK Sommer P (2012) Digital evidence, digital investigations and e-disclosure: a guide to forensic readiness for organizations, security advisers and lawyers (third edition). Information assurance advisory council (IAAC), Swindon, UK
18.
go back to reference Stephenson P (2012) Official (ISC)\(^{2{\textregistered }}\) Guide to the CCFP CBK. Auerbach, FL Stephenson P (2012) Official (ISC)\(^{2{\textregistered }}\) Guide to the CCFP CBK. Auerbach, FL
19.
go back to reference Thorpe S, Ray I, Grandison T, Barbir A (2012) Cloud log forensics metadata analysis. IEEE 36th Annual on computer software and applications conference workshops (COMPSACW). Izmir, Turkey, pp 194–199 Thorpe S, Ray I, Grandison T, Barbir A (2012) Cloud log forensics metadata analysis. IEEE 36th Annual on computer software and applications conference workshops (COMPSACW). Izmir, Turkey, pp 194–199
20.
go back to reference Watson D, Jones A (2013) Digital forensics processing and procedures meeting the requirements of ISO 17020, ISO17025, ISO 27001 and best practice requirements. Elsevier, MA Watson D, Jones A (2013) Digital forensics processing and procedures meeting the requirements of ISO 17020, ISO17025, ISO 27001 and best practice requirements. Elsevier, MA
22.
go back to reference Zawoad S, Hasan R (2013) Cloud forensics: a meta-study of challenges, approaches, and open problems. University of Alabama at Birmingham, USA Zawoad S, Hasan R (2013) Cloud forensics: a meta-study of challenges, approaches, and open problems. University of Alabama at Birmingham, USA
Metadata
Title
Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments
Author
Da-Yu Kao
Publication date
01-01-2016
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 1/2016
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1516-7

Other articles of this Issue 1/2016

The Journal of Supercomputing 1/2016 Go to the issue

Premium Partner