Abstract- less you need, use only when you

Abstract- Cloud computing is going to be popular among organizationsof Bangladesh keep in touch with the virtualization technologies. It is a new computing paradigm, involving data computation outsourcing withInfinite and elastic resource scalability, On demand “just-in-time”provisioning, No upfront cost means pay-as-you-go are some of the attractions of the cloud computing. That is, use as much or as less you need, use only when you want,and pay only what you uses. Cloudcomputing uses increasing rapidly in the world for that cloud forensics is essentialbecause security risks are surrounding the new technologies.

Cloudcomputing and digital forensics are both together called Cloud forensics whichis developing and understanding of the main aspects of both cloud computing anddigital forensics. In cloudcomputing it is necessary to identify its impact on current digital forensicsguidelines and procedures and understand its characteristics and the differentservices and deployment models but also to survey the solid foundation of cloudcomputing such as virtualization. Papers discussing the concept, issues,challenges, problem, possibilities and future of cloud computing and digitalforensics in relation to cloud forensics, in this paper, I will discuss thefoundation of cloud forensics elements which are required to provide forensics friendlycloud services. Furthermore, I suggest a set of questions that will aid in theprocess of cloud forensics analysis.  CLOUDFORENSICSCloudforensics is the combination of digital forensics and cloud computing. Thecloud computing benefits are the reasons that are making forensic communityconcerned. The scalability of the cloud means at one point, data from differentsources can occupy the same sectors within the storage media which creates adilemma during ediscovery, while a company is being investigated; theinvestigator unknowingly acquires residual data from another company 20. Thegrowth of storage capacity in cloud computing is a disadvantage for digitalforensics since there would be more forensic data and more time consumption toanalyse the data, of course, if nothing goes wrong.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

There are otherinsufficiencies and incompatibles of the traditional digital forensics methods(e.g. encryption, multi-jurisdiction, & proliferation of endpoints) incloud computing therefore it is necessary to adopt digital forensics knowledgeand tools in cloud computing in order to establish a forensic capability towardreducing cloud security risks 23. Cloud computing is a new model and digitalforensics community is still exploring what difficulties this new technology iscarrying for them. There have been many published papersstating the potential encountered difficulties in the process of maintainingthe chain of custody. Even leading private or public organizations like SANS,ISACA or NIST have not yet presented a set of recommendations or best practicesto follow when there is a security incident inside of the cloud or guidelines onhow to implement the cloud in organizations 6.

In some cases, cloud computingcould be able to assist network forensics in their online investigations forcybercrimes. Criminals may abuse professional anonymous communications systemssuch as Tor and Anamymizer which were originally designed for protectingnetwork users form identity theft and profiling. Therefore, law enforcement maypurchase tens of Amazon EC2 VMs, joining the Tor network as sentinels which canact as entry & exit nodes for Tor circuits and would be able to determinethe attack sources within appropriate trace back techniques 11. Amazon webservices (AWS) is another good example which can automatically provide a MD5 ofevery file that is on the system so when a bit by bit copy is being processed,everything is carried over with it including the Metadata files in MicrosoftOffice, email stores and exact backups 10. IntroductionCloudcomputing Has the potential To become one of the most transformativedevelopments in the history of computing, following the footsteps ofmainframes, minicomputers, PCs (Personal Computers), smart phones, and so on(Perry et al.,2009). It is radically changing how information technologyservices are created, delivered, accessed and managed.

Gartner estimates by 2015,20% of non–?ITGlobal 500 companies will be cloud service providers (Gartner,2010). However, therapid growth and an of cloud computing as an on?standard system (Beebe, 2009), is bringingdigital forensics deeper into the crisis it is facing (Garfinkel, 2010). Encryption,prolife ration of endpoints, multi-?jurisdiction,loss of data control, to name a few, are all challenges exacerbated in cloudenvironments for forensic investigations due to a general lack of tools and expertise.Cloud organizations, including CSPs (Cloud Service Provider) and cloud customers,have to establish a cloud forensic capability; otherwise, they will face tremendousdifficulties in carrying out investigations on critical incidents in cloud architecturesuch as criminal intrusions and major policy violations in order to restore operations,data and services. They will also face difficulties when collaborating with lawenforcement in cases of resource confiscation, etc.

, due to lack of forensic knowledgeand preparation. Ruanetal. (2011) first gave an overview of cloud forensics, introducedthe cloud forensics three?dimensionalmodel, and analyzed some of the major challenges and opportunities of cloud forensics.

In order to validate the key areas covered in Ruanetal. (2011) and to study thecritical criteria for cloud forensic capability here searchers carried out thissurvey towards digital forensic experts and practitioners around the world on somekey questions of cloud forensics, such as the definition of cloud forensics, themost significant challenges and opportunities of cloud forensics, the most valuableresearch direction for cloud forensics, etc. The survey was opened on13th Feb 2011andwas widely circulated.

x

Hi!
I'm Simon!

Would you like to get a custom essay? How about receiving a customized one?

Check it out