SlideShare uma empresa Scribd logo
1 de 16
www.shehansanjula.dev
Challenges of Cloud Forensics
IT19154404 R. A. Shehan Sanjula
Cyber Forensics and Incident Response - IE4062
Topics
Introduction
 Cloud Computing
 Digital & Cloud Forensics
 Types of Cloud Services
 Types of Clouds
01 Impact of Cloud
Forensics
 Researches
 Related Work
 General Challenges
02
Evaluation of Cloud
Forensics
 Challenges/ Process
1. Identification
2. Preservation – Collection
3. Examination – Analysis
4. Presentation
5. Uncategorized
 Cloud Forensics Overview – Summary
03
Limitations and
Future Developments
 Cloud Forensics Solutions
 Tools and Limitations
 Future Developments
 Conclusion
04
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
Cloud Computing?
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
 Digital Forensics
 Cloud Forensics
 Cloud vs Digital Forensics
• Types of Cloud Services
 SaaS
 PaaS
 IaaS
Cloud computing is the future!
• Types of Clouds
 Public Cloud
 Private Cloud
 Hybrid Cloud
1. Introduction to Digital and Cloud Forensics
“Cloud forensics is the application of digital forensics in cloud
computing as a subset of network forensics to gather and
preserve evidence in a way that is suitable for presentation in a
court of law.”
“Cloud Computing is a model for enabling ubiquitous, convenient, on-
demand network access to a shared pool of configurable computing
resources (e.g., networks, servers, storage, applications and services)
that can be rapidly provisioned and released with minimal management
effort or service provider interaction. [8]”
- NIST Special Publication 800-145
Cloud Forensics?
2. Impact of Cloud Forensics
2.1 Related Work & Researches
on Cloud Forensics
1. The First Digital Forensic Research Workshop (DFRWS) [1]
2. The Abstract Digital Forensic model [2] (based on DFRWS model)
3. Integrated Digital Investigation Process model [3]
4. The Enhanced Digital Investigation Process model [4]
5. The hierarchical, objectives-based framework for the digital investigations [5]
6. Forensic Process [6]
7. The Digital Forensic Investigation Framework (DFIF) [7]
8. Digital Forensic Evidence Processes [8]
9. The Harmonized digital forensic investigation process model [2]
10.The Forensic Investigations Process [1] in cloud environments
11. Cloud Forensics Process [3]
12. The Integrated Conceptual Digital Forensic Framework for Cloud Computing [7]
101001101001000010101
0011110111011011011010
101000011100101011001
010100111010100010101
0001011010110110110100
010101110001010100010
1000101110101100010011
010011010010000101010
0111101110110110110101
010000111001010110010
101001110101000101010
0010110101101101101001
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
2.2 General Challenges on
Cloud Forensics
• Jurisdictions.
• External chain of dependencies.
• Different approaches in cloud computing.
• Lack of international collaboration.
• Lack of law/regulation and law advisory.
• Decreased control over forensic data.
• Lack of forensics expertise.
• Hard to isolate an individual user’s data from the others.
• No evidence that links a given data file to a particular suspect.
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
101001101001000010101
0011110111011011011010
101000011100101011001
010100111010100010101
0001011010110110110100
010101110001010100010
1000101110101100010011
010011010010000101010
0111101110110110110101
010000111001010110010
101001110101000101010
0010110101101101101001
3. Evaluation of Cloud
Forensics
• Access to Evidence in Logs.
• Physical Inaccessibility.
• Volatile Data.
• Distribution - Collaboration.
• Client-Side Identification.
• Dependence on CSP - Trust.
• Service Level Agreement (SLA).
Challenges/ Process
1. Identification Stage
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
3. Evaluation of Cloud
Forensics cont.
• Integrity and Stability.
• Privacy.
• Time Synchronization.
• Internal Staffing.
• Chain of Custody.
• Imaging.
• Bandwidth Limitation.
• Multi-jurisdiction.
• Multi-tenancy.
Challenges/ Process
2. Preservation – Collection Stage
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
101001101001000010101
0011110111011011011010
101000011100101011001
010100111010100010101
0001011010110110110100
010101110001010100010
1000101110101100010011
010011010010000101010
0111101110110110110101
010000111001010110010
101001110101000101010
0010110101101101101001
3. Evaluation of Cloud
Forensics cont.
• Lack of Forensic Tools.
• Volume of Data.
• Encryption.
• Reconstruction.
• Unification of Log Formats.
• Identity.
Challenges/ Process
3. Examination - Analysis Stage
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
3. Evaluation of Cloud
Forensics cont.
• Complexity of Testimony.
• Documentation.
Challenges/ Process
4. Presentation Stage
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
• Compliance Issues.
5. Uncategorized
3. Evaluation of Cloud
Forensics cont.
√ denotes that a challenge is present, and X denotes that a
challenge is not present according to the referenced authors.
Cloud Forensics Overview – Summary
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
Table 1. Cloud Forensics Challenges Overview [15]
4. Limitations and Future
Developments
1. Encase Enterprise
2. Accessdata FTK
3. FROST
4. UFED cloud analyzer
5. Docker Forensics Toolkit & Docker Explorer
6. Diffy (by Netflix)
4.1 Cloud Forensics Solutions
Tools
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
Cloud Forensics Tools & its Limitations?
4. Limitations and Future
Developments cont.
1. Cloud infrastructure dependability
2. Time synchronization in a cloud context
3. Expansion of endpoints
4. Virtualization & shared infrastructure
5. FaaS (Forensics as a Service)
4.2 Cloud Forensics Solutions
Open Issues, and Future Research
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
Conclusion
Future?
• Existing Cloud Forensics Solutions
• Cloud Forensics & Future Developments
References
[1] N. Vaidya, "Cloud Forensics: Trends and Challenges," INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY
(IJERT), Sep. 29, 2020. (accessed May. 15, 2022).
[2] S. Simou, C. Kalloniatis, H. Mouratidis and S. Gritzalis, "A survey on cloud forensics challenges and solutions," Security and
Communication Networks, vol. 09, no. 09, Sep. 2020, doi: 10.1002/sec.1688.
[3] E. Morioka and M. S. Sharbaf, "Digital Forensics Research on Cloud Computing: An investigation of Cloud Forensics Solutions,"
Department of Computer Science, Mar. 2021.
[4] C. Kalloniatis, S. Simou, E. Kavakli and "Cloud Forensics: Identifying the Major Issues and Challenges," Journals | Oxford Academic, Nov.
8, 2020. (accessed Jan. 17, 2022).
[5] "Cloud Forensics Basic Concepts and Tools in 2022," Eescorporation, Mar. 5, 2019. https://www.eescorporation.com/cloud-forensics-
concepts-and-tools/(accessed May. 11, 2022).
[6] N. Lim, "Cloud Forensics and the Digital Crime Scene," AppDirect Blog, Jul. 1, 2021. https://www.appdirect.com/blog/cloud-forensics-and-
the-digital-crime-scene (accessed May. 14, 2022).
[7] "Market Trends Report: Cloud Forensics in Today’s World," The EC-Council Cyber Research report, Sep. 16, 2021.
https://cisomag.eccouncil.org/market-trends-report-cloud-forensics-in-todays-world/(accessed May. 18, 2022).
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
References
[8] "Cloud Forensics: Open Issues, Challenges and Future Research Opportunities," CYBER SECURITY & NETWORK
FORENSICSRESEARCH, Oct. 18, 2021. https://insights2techinfo.com/cloud-forensics-open-issues-challenges-and-future-research-
opportunities/(accessed May. 16, 2022).
[9] Martini B, Choo KKR. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 2014; 9(2):71–80.
[10] Chen G. Du Y, Qin P, Du J. Suggestions to digital forensics in cloud computing ERA. In Network Infrastructure and Digital Content (IC-
NIDC), 20123rd IEEEInternational Conference on. IEEE, 2016; 540–544
[11] Ruan K, Carthy J, Kechadi T, Crosbie M. Cloud forensics: an overview. In Advances in Digital Forensics VII, 7th IFIP WG 11.9
International Conference on Digital Forensics, Vol. 361, Peterson G, Shenoi S (eds). Springer: Berlin Heidelberg, 2019; 35–46.
[12] Zhou L, Varadharajan V, Hitchens M. Achieving secure role-based access control on encrypted data in cloud storage. Information
Forensics and Security IEEE Transactions on IEEE 2013; 8(12):1947–1960.
[13] Sang T. A log-based approach to make digital forensics easier on cloud computing. In Proceedings of the Intelligent System Design and
Engineering Applications (ISDEA), 2013 3rd International Conference on. IEEE, 2013; 91–94.
[14] Zimmerman S, Glavach D. Cyber forensics in the cloud. IA Newsletter 2016; 14(1):4–7
[15] Valjarevic A, Venter HS. Harmonised digital forensic investigation process model. In Information Security
for South Africa (ISSA). IEEE: Johannesburg, Gauteng, 2012; 1–10.
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
THANK YOU
Stay Home Stay Safe
IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062

Mais conteúdo relacionado

Mais procurados

Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and ManagementAllen Brokken
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdfMAHESHUMANATHGOPALAK
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsN.Jagadish Kumar
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsOllie Whitehouse
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution hashnees
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesGreenway Health
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadarPencilData
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodologyPiyush Jain
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligenceabhisheksinghcs
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptxMoshe Ferber
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 

Mais procurados (20)

Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Ibm security guardium
Ibm security guardiumIbm security guardium
Ibm security guardium
 
Azure Security and Management
Azure Security and ManagementAzure Security and Management
Azure Security and Management
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 
100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf100 Security Operation Center Tools.pdf
100 Security Operation Center Tools.pdf
 
Cyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection toolsCyber forensic-Evedidence collection tools
Cyber forensic-Evedidence collection tools
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
McAfee SIEM solution
McAfee SIEM solution McAfee SIEM solution
McAfee SIEM solution
 
Roadmap to IT Security Best Practices
Roadmap to IT Security Best PracticesRoadmap to IT Security Best Practices
Roadmap to IT Security Best Practices
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 
Cloud Security Architecture.pptx
Cloud Security Architecture.pptxCloud Security Architecture.pptx
Cloud Security Architecture.pptx
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 

Semelhante a Challenges of Cloud Forensics.pptx

B530429_FinalDissertation
B530429_FinalDissertationB530429_FinalDissertation
B530429_FinalDissertationJasjoot Mudhar
 
Dagrep v006-i009-complete 2
Dagrep v006-i009-complete 2Dagrep v006-i009-complete 2
Dagrep v006-i009-complete 2sandeep1721
 
Dagrep v006-i009-complete
Dagrep v006-i009-completeDagrep v006-i009-complete
Dagrep v006-i009-completesandeep1721
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionIJERA Editor
 
MSc Dissertation on cloud Deekshant Jeerakun
MSc Dissertation on cloud Deekshant JeerakunMSc Dissertation on cloud Deekshant Jeerakun
MSc Dissertation on cloud Deekshant JeerakunDeekshant Jeerakun. MBCS
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityTech and Law Center
 
Cloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and InnovationCloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and InnovationAlan Sill
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing surveyIAESIJEECS
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1MalikPinckney86
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWcscpconf
 
Internet of Things: Current Trends & Future Directions in Malaysia
Internet of Things: Current Trends & Future Directions in MalaysiaInternet of Things: Current Trends & Future Directions in Malaysia
Internet of Things: Current Trends & Future Directions in MalaysiaRosdiadee Nordin
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdfFinTech Belgium
 
1. With different types of cloud service delivery, what are the di.docx
1. With different types of cloud service delivery, what are the di.docx1. With different types of cloud service delivery, what are the di.docx
1. With different types of cloud service delivery, what are the di.docxjeremylockett77
 
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014Charith Perera
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...DESMOND YUEN
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael Enescu
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
 

Semelhante a Challenges of Cloud Forensics.pptx (20)

B530429_FinalDissertation
B530429_FinalDissertationB530429_FinalDissertation
B530429_FinalDissertation
 
Dagrep v006-i009-complete 2
Dagrep v006-i009-complete 2Dagrep v006-i009-complete 2
Dagrep v006-i009-complete 2
 
Dagrep v006-i009-complete
Dagrep v006-i009-completeDagrep v006-i009-complete
Dagrep v006-i009-complete
 
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed SolutionCloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
 
MSc Dissertation on cloud Deekshant Jeerakun
MSc Dissertation on cloud Deekshant JeerakunMSc Dissertation on cloud Deekshant Jeerakun
MSc Dissertation on cloud Deekshant Jeerakun
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 
Cloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and InnovationCloud Testbeds for Standards Development and Innovation
Cloud Testbeds for Standards Development and Innovation
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
IEEE INTERNET OF THINGS JOURNAL, VOL. 7, NO. 1, JANUARY 2020 1
 
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEWFORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
 
Internet of Things: Current Trends & Future Directions in Malaysia
Internet of Things: Current Trends & Future Directions in MalaysiaInternet of Things: Current Trends & Future Directions in Malaysia
Internet of Things: Current Trends & Future Directions in Malaysia
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
06_Joeri Van Speybroek_Dell_MeetupDora&Cybersecurity.pdf
 
1. With different types of cloud service delivery, what are the di.docx
1. With different types of cloud service delivery, what are the di.docx1. With different types of cloud service delivery, what are the di.docx
1. With different types of cloud service delivery, what are the di.docx
 
WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014WF-IOT-2014, Seoul, Korea, 06 March 2014
WF-IOT-2014, Seoul, Korea, 06 March 2014
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iotMichael enescu keynote chicago2014_from_cloud_to_fog_and_iot
Michael enescu keynote chicago2014_from_cloud_to_fog_and_iot
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
The Cloud: Privacy and Forensics
The Cloud: Privacy and ForensicsThe Cloud: Privacy and Forensics
The Cloud: Privacy and Forensics
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 

Último

Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTechSoup
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptxmansk2
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticspragatimahajan3
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPragya - UEM Kolkata Quiz Club
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45MysoreMuleSoftMeetup
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...Nguyen Thanh Tu Collection
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeSaadHumayun7
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
Behavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfBehavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfaedhbteg
 

Último (20)

Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
size separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceuticssize separation d pharm 1st year pharmaceutics
size separation d pharm 1st year pharmaceutics
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdfPost Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
Post Exam Fun(da) Intra UEM General Quiz 2024 - Prelims q&a.pdf
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT VẬT LÝ 2024 - TỪ CÁC TRƯỜNG, TRƯ...
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdfPost Exam Fun(da) Intra UEM General Quiz - Finals.pdf
Post Exam Fun(da) Intra UEM General Quiz - Finals.pdf
 
Neurulation and the formation of the neural tube
Neurulation and the formation of the neural tubeNeurulation and the formation of the neural tube
Neurulation and the formation of the neural tube
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
Behavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfBehavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdf
 

Challenges of Cloud Forensics.pptx

  • 1. www.shehansanjula.dev Challenges of Cloud Forensics IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
  • 2. Topics Introduction  Cloud Computing  Digital & Cloud Forensics  Types of Cloud Services  Types of Clouds 01 Impact of Cloud Forensics  Researches  Related Work  General Challenges 02 Evaluation of Cloud Forensics  Challenges/ Process 1. Identification 2. Preservation – Collection 3. Examination – Analysis 4. Presentation 5. Uncategorized  Cloud Forensics Overview – Summary 03 Limitations and Future Developments  Cloud Forensics Solutions  Tools and Limitations  Future Developments  Conclusion 04 IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
  • 3. Cloud Computing? IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062  Digital Forensics  Cloud Forensics  Cloud vs Digital Forensics • Types of Cloud Services  SaaS  PaaS  IaaS Cloud computing is the future! • Types of Clouds  Public Cloud  Private Cloud  Hybrid Cloud 1. Introduction to Digital and Cloud Forensics “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and preserve evidence in a way that is suitable for presentation in a court of law.” “Cloud Computing is a model for enabling ubiquitous, convenient, on- demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. [8]” - NIST Special Publication 800-145 Cloud Forensics?
  • 4. 2. Impact of Cloud Forensics
  • 5. 2.1 Related Work & Researches on Cloud Forensics 1. The First Digital Forensic Research Workshop (DFRWS) [1] 2. The Abstract Digital Forensic model [2] (based on DFRWS model) 3. Integrated Digital Investigation Process model [3] 4. The Enhanced Digital Investigation Process model [4] 5. The hierarchical, objectives-based framework for the digital investigations [5] 6. Forensic Process [6] 7. The Digital Forensic Investigation Framework (DFIF) [7] 8. Digital Forensic Evidence Processes [8] 9. The Harmonized digital forensic investigation process model [2] 10.The Forensic Investigations Process [1] in cloud environments 11. Cloud Forensics Process [3] 12. The Integrated Conceptual Digital Forensic Framework for Cloud Computing [7] 101001101001000010101 0011110111011011011010 101000011100101011001 010100111010100010101 0001011010110110110100 010101110001010100010 1000101110101100010011 010011010010000101010 0111101110110110110101 010000111001010110010 101001110101000101010 0010110101101101101001 IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
  • 6. 2.2 General Challenges on Cloud Forensics • Jurisdictions. • External chain of dependencies. • Different approaches in cloud computing. • Lack of international collaboration. • Lack of law/regulation and law advisory. • Decreased control over forensic data. • Lack of forensics expertise. • Hard to isolate an individual user’s data from the others. • No evidence that links a given data file to a particular suspect. IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
  • 7. 101001101001000010101 0011110111011011011010 101000011100101011001 010100111010100010101 0001011010110110110100 010101110001010100010 1000101110101100010011 010011010010000101010 0111101110110110110101 010000111001010110010 101001110101000101010 0010110101101101101001 3. Evaluation of Cloud Forensics • Access to Evidence in Logs. • Physical Inaccessibility. • Volatile Data. • Distribution - Collaboration. • Client-Side Identification. • Dependence on CSP - Trust. • Service Level Agreement (SLA). Challenges/ Process 1. Identification Stage IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
  • 8. 3. Evaluation of Cloud Forensics cont. • Integrity and Stability. • Privacy. • Time Synchronization. • Internal Staffing. • Chain of Custody. • Imaging. • Bandwidth Limitation. • Multi-jurisdiction. • Multi-tenancy. Challenges/ Process 2. Preservation – Collection Stage IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062 101001101001000010101 0011110111011011011010 101000011100101011001 010100111010100010101 0001011010110110110100 010101110001010100010 1000101110101100010011 010011010010000101010 0111101110110110110101 010000111001010110010 101001110101000101010 0010110101101101101001
  • 9. 3. Evaluation of Cloud Forensics cont. • Lack of Forensic Tools. • Volume of Data. • Encryption. • Reconstruction. • Unification of Log Formats. • Identity. Challenges/ Process 3. Examination - Analysis Stage IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
  • 10. 3. Evaluation of Cloud Forensics cont. • Complexity of Testimony. • Documentation. Challenges/ Process 4. Presentation Stage IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062 • Compliance Issues. 5. Uncategorized
  • 11. 3. Evaluation of Cloud Forensics cont. √ denotes that a challenge is present, and X denotes that a challenge is not present according to the referenced authors. Cloud Forensics Overview – Summary IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062 Table 1. Cloud Forensics Challenges Overview [15]
  • 12. 4. Limitations and Future Developments 1. Encase Enterprise 2. Accessdata FTK 3. FROST 4. UFED cloud analyzer 5. Docker Forensics Toolkit & Docker Explorer 6. Diffy (by Netflix) 4.1 Cloud Forensics Solutions Tools IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062 Cloud Forensics Tools & its Limitations?
  • 13. 4. Limitations and Future Developments cont. 1. Cloud infrastructure dependability 2. Time synchronization in a cloud context 3. Expansion of endpoints 4. Virtualization & shared infrastructure 5. FaaS (Forensics as a Service) 4.2 Cloud Forensics Solutions Open Issues, and Future Research IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062 Conclusion Future? • Existing Cloud Forensics Solutions • Cloud Forensics & Future Developments
  • 14. References [1] N. Vaidya, "Cloud Forensics: Trends and Challenges," INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT), Sep. 29, 2020. (accessed May. 15, 2022). [2] S. Simou, C. Kalloniatis, H. Mouratidis and S. Gritzalis, "A survey on cloud forensics challenges and solutions," Security and Communication Networks, vol. 09, no. 09, Sep. 2020, doi: 10.1002/sec.1688. [3] E. Morioka and M. S. Sharbaf, "Digital Forensics Research on Cloud Computing: An investigation of Cloud Forensics Solutions," Department of Computer Science, Mar. 2021. [4] C. Kalloniatis, S. Simou, E. Kavakli and "Cloud Forensics: Identifying the Major Issues and Challenges," Journals | Oxford Academic, Nov. 8, 2020. (accessed Jan. 17, 2022). [5] "Cloud Forensics Basic Concepts and Tools in 2022," Eescorporation, Mar. 5, 2019. https://www.eescorporation.com/cloud-forensics- concepts-and-tools/(accessed May. 11, 2022). [6] N. Lim, "Cloud Forensics and the Digital Crime Scene," AppDirect Blog, Jul. 1, 2021. https://www.appdirect.com/blog/cloud-forensics-and- the-digital-crime-scene (accessed May. 14, 2022). [7] "Market Trends Report: Cloud Forensics in Today’s World," The EC-Council Cyber Research report, Sep. 16, 2021. https://cisomag.eccouncil.org/market-trends-report-cloud-forensics-in-todays-world/(accessed May. 18, 2022). IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
  • 15. References [8] "Cloud Forensics: Open Issues, Challenges and Future Research Opportunities," CYBER SECURITY & NETWORK FORENSICSRESEARCH, Oct. 18, 2021. https://insights2techinfo.com/cloud-forensics-open-issues-challenges-and-future-research- opportunities/(accessed May. 16, 2022). [9] Martini B, Choo KKR. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation 2014; 9(2):71–80. [10] Chen G. Du Y, Qin P, Du J. Suggestions to digital forensics in cloud computing ERA. In Network Infrastructure and Digital Content (IC- NIDC), 20123rd IEEEInternational Conference on. IEEE, 2016; 540–544 [11] Ruan K, Carthy J, Kechadi T, Crosbie M. Cloud forensics: an overview. In Advances in Digital Forensics VII, 7th IFIP WG 11.9 International Conference on Digital Forensics, Vol. 361, Peterson G, Shenoi S (eds). Springer: Berlin Heidelberg, 2019; 35–46. [12] Zhou L, Varadharajan V, Hitchens M. Achieving secure role-based access control on encrypted data in cloud storage. Information Forensics and Security IEEE Transactions on IEEE 2013; 8(12):1947–1960. [13] Sang T. A log-based approach to make digital forensics easier on cloud computing. In Proceedings of the Intelligent System Design and Engineering Applications (ISDEA), 2013 3rd International Conference on. IEEE, 2013; 91–94. [14] Zimmerman S, Glavach D. Cyber forensics in the cloud. IA Newsletter 2016; 14(1):4–7 [15] Valjarevic A, Venter HS. Harmonised digital forensic investigation process model. In Information Security for South Africa (ISSA). IEEE: Johannesburg, Gauteng, 2012; 1–10. IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062
  • 16. THANK YOU Stay Home Stay Safe IT19154404 R. A. Shehan Sanjula Cyber Forensics and Incident Response - IE4062