Skip to main content
Top

2015 | OriginalPaper | Chapter

44. Forensics Issues in Cloud Usage

Author : William R. Simpson

Published in: Transactions on Engineering Technologies

Publisher: Springer Netherlands

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Forensics is undertaken to find out exactly what happened on a computing system and who or what was responsible for it. This is done by a structured investigation while maintaining a documented chain of evidence. Cloud computing is emerging as an attractive, cost effective computing paradigm. The early offerings of cloud capabilities have not provided security, monitoring or attribution that would allow an effective forensics investigation. The high assurance requirement presents many challenges to normal computing and some rather precise requirements that have developed from high assurance issues for web service applications and forensics applications of cloud systems. The challenges of high assurance and the maintenance of a documented chain of evidence associated with cloud computing are primarily in four areas. The first is virtualization and the loss of attribution that accompanies a highly virtualized environment. The second is the loss of ability to perform end-to-end communications. The third is the extent to which encryption is needed and the need for a comprehensive key management process for public key infrastructure, as well as session and other cryptologic keys. The fourth is in the availability of monitoring and logging for attribution, compliance and data forensics. Our view of high assurance and the issues associated with web services is shaped by our work with DoD and the Air Force, but applies to a broader range of applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Simpson, W.R., Coimbatore Chandersekaran: Cloud forensics issues. Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering 2012, pp. 475–480. London, 2–4 July 2014 Simpson, W.R., Coimbatore Chandersekaran: Cloud forensics issues. Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering 2012, pp. 475–480. London, 2–4 July 2014
6.
go back to reference Air Force Information Assurance Strategy Team, Air Force Information Assurance Enterprise Architecture, Version 1.70, SAF/XC, 15 Mar 2009 [Not available to all] Air Force Information Assurance Strategy Team, Air Force Information Assurance Enterprise Architecture, Version 1.70, SAF/XC, 15 Mar 2009 [Not available to all]
7.
go back to reference Windows Server 2003: Active Directory Infrastructure. Microsoft Press, pp. 1–8 to 1–9 (2003). ISBN: 0-7356-1438-5 Windows Server 2003: Active Directory Infrastructure. Microsoft Press, pp. 1–8 to 1–9 (2003). ISBN: 0-7356-1438-5
10.
go back to reference Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0. Microsoft Corporation (2005) Web Service Security: Scenarios, Patterns, and Implementation Guidance for Web Services Enhancements (WSE) 3.0. Microsoft Corporation (2005)
16.
go back to reference Simpson, W.R., Coimbatore Chandersekaran: The 2nd International Multi-Conference on Engineering and Technological Innovation: IMETI2009, vol. I, pp. 300–305. Information Sharing and Federation, Orlando, July 2009 Simpson, W.R., Coimbatore Chandersekaran: The 2nd International Multi-Conference on Engineering and Technological Innovation: IMETI2009, vol. I, pp. 300–305. Information Sharing and Federation, Orlando, July 2009
17.
go back to reference Simpson, W.R., Coimbatore Chandersekaran: International Journal of Computer Technology and Application (IJCTA). An Agent-Based Web-Services Monitoring System, vol. 2, no. 9, pp. 675–685, Sept 2011 Simpson, W.R., Coimbatore Chandersekaran: International Journal of Computer Technology and Application (IJCTA). An Agent-Based Web-Services Monitoring System, vol. 2, no. 9, pp. 675–685, Sept 2011
18.
go back to reference Coimbatore Chandersekaran, Simpson, W.R.: Claims-based enterprise-wide access control. Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering 2012, pp. 524–529, London, 4–6 July 2012 Coimbatore Chandersekaran, Simpson, W.R.: Claims-based enterprise-wide access control. Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering 2012, pp. 524–529, London, 4–6 July 2012
19.
go back to reference Coimbatore Chandersekaran, Simpson, W.R.: Assured content delivery in the enterprise. Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering 2012, pp. 555–560, London, 4–6 July 2012 Coimbatore Chandersekaran, Simpson, W.R.: Assured content delivery in the enterprise. Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering 2012, pp. 555–560, London, 4–6 July 2012
20.
go back to reference Simpson, W.R., and Coimbatore Chandersekaran: Claims-based authentication for a web-based enterprise. Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering 2013, pp. pp. 1204–1209, London, 3–5 July 2012 Simpson, W.R., and Coimbatore Chandersekaran: Claims-based authentication for a web-based enterprise. Lecture Notes in Engineering and Computer Science: Proceedings World Congress on Engineering 2013, pp. pp. 1204–1209, London, 3–5 July 2012
Metadata
Title
Forensics Issues in Cloud Usage
Author
William R. Simpson
Copyright Year
2015
Publisher
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-017-9804-4_44

Premium Partners