Elsevier

Network Security

Volume 2011, Issue 3, March 2011, Pages 4-10
Network Security

Feature
Forensic investigation of cloud computing systems

https://doi.org/10.1016/S1353-4858(11)70024-1Get rights and content

Cloud computing describes a computing concept where software services, and the resources they use, operate as (and on) a virtualised platform across many different host machines, connected by the Internet or an organisation's internal network. From a business or system user's point of view, the cloud provides, via virtualisation, a single platform or service collection in which it can operate.

Cloud computing is a new concept in the distributed processing of data and is likely to make computer forensic evidence acquisition and evidence analysis increasingly complex.

Currently there do not appear to be any published guidelines that specifically address the conduct of computer forensic investigations of cloud computing systems. In order to understand and analyse evidence within this environment, computer forensics examiners will require a broader range of technical knowledge across multiple hardware platforms and operating systems. Dr Mark Taylor et al examine the issues concerning the forensic investigation of cloud systems.

Section snippets

Exposure to threats

Cloud computing involves potentially greater exposure to security threats and privacy breaches, especially when the cloud is based on the Internet rather than an organisation's own internal network. For example, it might be unclear as to where data is processed within a cloud computing system, and such processing can occur in differing jurisdictions. Current commercial cloud service providers include Microsoft Azure Services Platform, Amazon Web Services and Google, as well as open source cloud

Fighting crime

Computer forensics has emerged in recent years as an important tool in the fight against crime. It is defined as the application of computer investigation and analysis techniques to determine potential evidence.1 Traditionally, computer forensics has classified crime involving computers and associated technologies in three ways — the computer is: the target of the crime; a repository of information used or generated during the commission of a crime; or a tool used in committing a crime.2 These

Linear process

Computer forensics investigations generally follow a linear process: identification, extraction, analysis and presentation of evidence. First, the analyst identifies potential sources of evidence. For example, what is the suspected crime? What hardware or software is being used by the suspect? Where is the evidence located? Second, the analyst must extract evidence in a robust manner to maintain its integrity. The computing environment is highly volatile as it deals with virtual rather than

Evidence acquisition

Digital evidence can be more ethereal and dynamic in the virtual environments provided in a cloud computing system. If a software application is accessed via a cloud computing system, data traditionally written to the operating system, such as registry entries or temporary Internet files, will reside or be stored within the virtual environment and so lost when the user exits the cloud. Virtualisation sanitises resources so the traditional analysis of leftover artefacts could be limited. This

Third-party location

Related to this architectural issue is that of the third party's location. Potentially, this can have a major impact on the investigatory jurisdiction and responsibility. Currently, the procedure for identifying and extracting evidence is the seizure of the computing device itself. The investigation team has the tangible evidence of the device and they are able to analyse the data held on it. However, the cloud computing paradigm aims to push data and services back into the network. Therefore,

Physical seizure

Cloud computing impacts upon the ability of law enforcement agencies to physically seize computing assets in order to pursue an investigation. If a law enforcement agency could find the appropriate server systems in a timely manner, it would be unlikely that they could get to information in a timely manner, and in particular, the agency could have difficulty in seizing such systems let alone ‘seize’ a datacentre.

Cloud computing can be broken down into different categories. These include

Suspects in the cloud

Finally, there is the issue of identifying the actual suspects within the cloud environment. In traditional forensics, a computer will be seized that has physical links to the suspect. For example, a computer might be seized from the suspect's home or work environment, thus physically tying the suspect to the machine and the evidence. Within the network environment, computers interact without a suspect's knowledge. As there is no physical interaction, identities within this networked

Evidence analysis

It could be difficult to analyse the sequence of events in a particular transaction in a cloud computing system since a variety of different machines might have been involved in the transaction — for example, a transaction involving updates to a large number of database tables in a distributed database. Another challenge facing the forensics community when analysing evidence in cloud computing environments is the degree of software standardisation, as there are several virtualisation platforms.

Audit trail

Cloud computing systems could potentially be made easier to forensically investigate whether some form of audit trail was maintained by the cloud system. For example, with regard to SaaS cloud environments, the software applications themselves could maintain appropriate audit trails of changes made to application data. With IaaS and PaaS cloud environments, logs could be maintained of users' activity within the cloud environment. However, given the typically large scale of cloud environments,

Management of computer forensic investigations

The first stage of a computer forensic investigation involving a cloud computing system would be to clearly identify the purpose of the investigation. For example, the investigation might concern unauthorised access to application systems based in the cloud, suspected fraud or money laundering or the accessing or dissemination of offensive material. It is important that the purpose of a computer forensic investigation is clearly defined so that the full scope of the investigatory process can be

Forensic agent

A private cloud computing system is for a single organisation's internal use and it may be run by the organisation itself or outsourced to a third party. Even in such a cloud computing environment within an organisation it may be difficult to shut down servers. In the public or hybrid private-public cloud computing environment this would be even more complex. A public cloud is managed by another organisation that provides cloud services. The more dispersed architecture of a public cloud system

Conclusions

Cloud computing is likely to make the acquisition and analysis of digital evidence more complex. Computer forensic investigations of cloud computing systems are likely to require more time and effort to undertake, due to the number of computing devices within the cloud that may need to be forensically examined. In addition, in legal terms, cloud computing systems will make it potentially more difficult for the computer forensic analyst to acquire and analyse digital evidence to the same

About the authors

Dr Mark Taylor is a senior lecturer in computing at Liverpool John Moores University. He is a Chartered IT Professional, a Chartered Engineer and a Chartered Scientist.

References (13)

  • J. Haggerty et al.

    ‘Managing corporate computer forensics’

    Computer Fraud and Security

    (2006)
  • Li, X; Seberry, J. ‘Forensic Computing’. 4th International Conference on Cryptology in India – Progress in Cryptology...
  • Mohay G; Anderson, A; Collie, B; del Vel, O. Computer and intrusion forensics, Artech House, Boston, MA, US, (2003)...
  • EnCase. Guidance Software

  • Forensic Tool Kit (FTK). AccessData

  • R. Grossman

    ‘The case for cloud computing’

    IT Professional

    (2009)
There are more references available in the full text version of this article.

Cited by (103)

  • Towards a practical cloud forensics logging framework

    2018, Journal of Information Security and Applications
    Citation Excerpt :

    Though the cloud computing offers significant benefits, there has been growing concern about the security, privacy, legal, and jurisdictional aspects of cloud environment and the way the cloud computing stores and process customers data [4]. Further to that researchers have pointed out that the cloud infrastructure is not matured to support digital forensic needs as well, and identified issues and challenges associated with conducting forensics in the cloud [5–7]. Researchers also have noted that, till date, there is no vendor which facilitates the forensic investigation in the cloud [8].

View all citing articles on Scopus

About the authors

Dr Mark Taylor is a senior lecturer in computing at Liverpool John Moores University. He is a Chartered IT Professional, a Chartered Engineer and a Chartered Scientist.

Dr John Haggerty is lecturer in information systems security at the University of Salford. His research interests include digital forensics, network security, signature matching and mobile computing.

David Gresty works for an independent security company principally in the field of law enforcement forensic investigations. He has extensive experience investigating child protection and the downloading of unlawful material.

Dr David Lamb is a research fellow in computer networks and security at Liverpool John Moores University.

View full text