SlideShare a Scribd company logo
Challenges in Cloud
Forensics
Hello!
I am Gayan Gothama
2
Content
3
2 4 6
7
5
3
What is Cloud
Computing ?
What is Cloud
Forensics?
Impact of the
Challenges
Types of Cloud & Cloud
Services
Common Cloud
Forensics Challenges?
Limitations of Existing
Methods
1
Existing Methods &
Tools
Future Developments
8
What is Cloud Computing ?
Cloud computing is a means of providing computing
services (including databases, servers, software, and
networking) via the internet, allowing the user to bypass
direct management of those systems. [1]
1
“
5
Types of Cloud
Private Cloud
Public Cloud
Hybrid Cloud
Main Types of Cloud Services
IaaS – Microsoft Azure | Cisco Metacloud
PaaS – OpenShift | AWS
SaaS - Cisco WebEx | GSuite
2
What is Cloud Forensics?
“Cloud forensics is the application of digital forensics in
cloud computing as a subset of network forensics to
gather and preserve evidence in a way that is suitable
for presentation in a court of law.”[2]
Cloud Forensics Steps
3
Common Cloud Forensics Challenges?[3]
“
8
Impact of the Challenges in
Identification Stage
1) Access to the Evidence in Logs
2) Unknown or Not Accessible Physical Location
“
9
Impact of the Challenges in
Collection & Preservation Stage
1) Multi-tenancy & Resource Sharing
2) Chain of Custody
3) Dependence on CSP [4]
“
10
Impact of the Jurisdictional
Challenges
1) Jurisdiction Challenges
 Involvement of international & local law
enforcement parties
 Bulletproof hosting
 Right to access data
5
Existing Methods for
Mitigating the Challenges
1) Resource Tagging
2) Isolating cloud instance & Sandboxing
3) RSA Signature [5]
4) SLA specifying the specific forensic Services
7
Tools Using for
Challenge Mitigation
1) UFED Cloud Analyzer
2) FROST
•Google My Activity and Facebook
•iCloud and Google backup
•Uber, Lyft
•DJI drones
•API logs
•Guest firewall logs
•Virtual disks
•API logs
•Guest firewall logs
•Virtual disks
6
Existing Methods
Limitations Related to Jurisdiction
1) International Commiunication and Cooperation
Limitation – Only effective for non urent invetigations
2) Foreign Jurisdiction Remote Examination
Limitation – Risk of damaging the target system
8
Future Developments
1) Method of Evidence Collection and Provenance
Preservation for Cloud Using SDN and Blockchain
Technology [6].
2) Permission Block Chain Based Data Logging and
Integrity Management System for Cloud Forensics [7].
“
References
[1] https://www.talend.com/resources/what-is-cloud-computing/
[2] https://kumarshivam-66534.medium.com/cloud-forensics-be18e14230de
[3] A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions | ACM
Computing Surveys. (2022). ACM Computing Surveys (CSUR). Retrieved from
https://dl.acm.org/doi/fullHtml/10.1145/3361216
[4] Ruan, K., et al. Key Terms for Service Level Agreements to Support Cloud Forensics. in IFIP Int. Conf.
Digital Forensics. 2012. Springer.
[5] Lin, C.-H., C.Y. Lee, and T.-W. Wu, A cloud-aided RSA signature scheme for sealing and storing the
digital evidences in computer forensics. International journal of security and its Applications, 2012.
6(2): p. 241-244.
[6] M. Pourvahab and G. Ekbatanifard, "Digital Forensics Architecture for Evidence Collection and
Provenance Preservation in IaaS Cloud Environment Using SDN and Blockchain Technology," in IEEE
Access, vol. 7, pp. 153349-153364, 2019, doi: 10.1109/ACCESS.2019.2946978.
[7] Park, Jun & Park, Jun & Huh, Eui. (2017). Block Chain Based Data Logging and Integrity Management
System for Cloud Forensics. 149-159. 10.5121/csit.2017.71112.
15
Thank
You!
Any questions?
16

More Related Content

What's hot

Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
Department of Computer Science
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysisBikrant Gautam
 
Firewall
FirewallFirewall
Firewall
nayakslideshare
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
BOSS Webtech
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
vampugani
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
Ollie Whitehouse
 
The Trouble with Cloud Forensics
The Trouble with Cloud ForensicsThe Trouble with Cloud Forensics
The Trouble with Cloud Forensics
Sharique Rizvi
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - NotesKranthi
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
DDoS Attack Detection and Botnet Prevention using Machine Learning
DDoS Attack Detection and Botnet Prevention using Machine LearningDDoS Attack Detection and Botnet Prevention using Machine Learning
DDoS Attack Detection and Botnet Prevention using Machine Learning
IRJET Journal
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection systemAkhil Kumar
 
GOOGLE FILE SYSTEM
GOOGLE FILE SYSTEMGOOGLE FILE SYSTEM
GOOGLE FILE SYSTEM
JYoTHiSH o.s
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
Kathirvel Ayyaswamy
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
Manu Mathew Cherian
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
Ali Broumandnia
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
shubhravrat Deshpande
 

What's hot (20)

Honeypot
Honeypot Honeypot
Honeypot
 
Security Threats at OSI layers
Security Threats at OSI layersSecurity Threats at OSI layers
Security Threats at OSI layers
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Network intrusion detection system and analysis
Network intrusion detection system and analysisNetwork intrusion detection system and analysis
Network intrusion detection system and analysis
 
Firewall
FirewallFirewall
Firewall
 
Cluster Computing
Cluster ComputingCluster Computing
Cluster Computing
 
Protection and Security in Operating Systems
Protection and Security in Operating SystemsProtection and Security in Operating Systems
Protection and Security in Operating Systems
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
The Trouble with Cloud Forensics
The Trouble with Cloud ForensicsThe Trouble with Cloud Forensics
The Trouble with Cloud Forensics
 
02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes02 Types of Computer Forensics Technology - Notes
02 Types of Computer Forensics Technology - Notes
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
DDoS Attack Detection and Botnet Prevention using Machine Learning
DDoS Attack Detection and Botnet Prevention using Machine LearningDDoS Attack Detection and Botnet Prevention using Machine Learning
DDoS Attack Detection and Botnet Prevention using Machine Learning
 
Intrusion detection system
Intrusion detection systemIntrusion detection system
Intrusion detection system
 
GOOGLE FILE SYSTEM
GOOGLE FILE SYSTEMGOOGLE FILE SYSTEM
GOOGLE FILE SYSTEM
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Cyber Forensics Module 1
Cyber Forensics Module 1Cyber Forensics Module 1
Cyber Forensics Module 1
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Tools and methods used in cyber crime
Tools and methods used in cyber crimeTools and methods used in cyber crime
Tools and methods used in cyber crime
 

Similar to Challenges in Cloud Forensics

Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
ijccsa
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
Swapnil Salunke
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
Samuel Borthwick
 
Why you should believe in cloud - ITCluster iQuest Cluj Napoca
Why you should believe in cloud - ITCluster iQuest Cluj Napoca Why you should believe in cloud - ITCluster iQuest Cluj Napoca
Why you should believe in cloud - ITCluster iQuest Cluj Napoca Radu Vunvulea
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
Valdez Ladd MBA, CISSP, CISA,
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security Metrics
Sandeep Saxena
 
G017424448
G017424448G017424448
G017424448
IOSR Journals
 
Cloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and ApplicationsCloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and Applications
Emiliano Reynares
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
Ajay p
 
Cloud technologies
Cloud technologiesCloud technologies
Cloud technologies
Uma Rangaraj
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Tannya seth
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
Shibwabo Christopher Anyembe
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
Paulo Renato
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Prateek Maurya
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
GovCloud Network
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
IRJET Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityTech and Law Center
 

Similar to Challenges in Cloud Forensics (20)

Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Ensuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the CloudEnsuring Distributed Accountability for Data Sharing in the Cloud
Ensuring Distributed Accountability for Data Sharing in the Cloud
 
Research Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud PlatformResearch Paper Digital Forensics on Google Cloud Platform
Research Paper Digital Forensics on Google Cloud Platform
 
Why you should believe in cloud - ITCluster iQuest Cluj Napoca
Why you should believe in cloud - ITCluster iQuest Cluj Napoca Why you should believe in cloud - ITCluster iQuest Cluj Napoca
Why you should believe in cloud - ITCluster iQuest Cluj Napoca
 
Cloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit PlanningCloud Breach - Forensics Audit Planning
Cloud Breach - Forensics Audit Planning
 
Cloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security MetricsCloud Monitoring And Forensic Using Security Metrics
Cloud Monitoring And Forensic Using Security Metrics
 
G017424448
G017424448G017424448
G017424448
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Cloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and ApplicationsCloud Computing - Fundamentals and Applications
Cloud Computing - Fundamentals and Applications
 
Cloud security Presentation
Cloud security PresentationCloud security Presentation
Cloud security Presentation
 
Cloud technologies
Cloud technologiesCloud technologies
Cloud technologies
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Secure third party cloud computing services a proposal by shibwabo anyembe
Secure third party cloud computing services   a proposal  by shibwabo anyembeSecure third party cloud computing services   a proposal  by shibwabo anyembe
Secure third party cloud computing services a proposal by shibwabo anyembe
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013NCOIC GCC OWS-10 presentation 10 7 2013
NCOIC GCC OWS-10 presentation 10 7 2013
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
The Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the SingularityThe Death Of Computer Forensics: Digital Forensics After the Singularity
The Death Of Computer Forensics: Digital Forensics After the Singularity
 

Recently uploaded

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Challenges in Cloud Forensics

  • 2. Hello! I am Gayan Gothama 2
  • 3. Content 3 2 4 6 7 5 3 What is Cloud Computing ? What is Cloud Forensics? Impact of the Challenges Types of Cloud & Cloud Services Common Cloud Forensics Challenges? Limitations of Existing Methods 1 Existing Methods & Tools Future Developments 8
  • 4. What is Cloud Computing ? Cloud computing is a means of providing computing services (including databases, servers, software, and networking) via the internet, allowing the user to bypass direct management of those systems. [1] 1
  • 5. “ 5 Types of Cloud Private Cloud Public Cloud Hybrid Cloud Main Types of Cloud Services IaaS – Microsoft Azure | Cisco Metacloud PaaS – OpenShift | AWS SaaS - Cisco WebEx | GSuite
  • 6. 2 What is Cloud Forensics? “Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics to gather and preserve evidence in a way that is suitable for presentation in a court of law.”[2] Cloud Forensics Steps
  • 7. 3 Common Cloud Forensics Challenges?[3]
  • 8. “ 8 Impact of the Challenges in Identification Stage 1) Access to the Evidence in Logs 2) Unknown or Not Accessible Physical Location
  • 9. “ 9 Impact of the Challenges in Collection & Preservation Stage 1) Multi-tenancy & Resource Sharing 2) Chain of Custody 3) Dependence on CSP [4]
  • 10. “ 10 Impact of the Jurisdictional Challenges 1) Jurisdiction Challenges  Involvement of international & local law enforcement parties  Bulletproof hosting  Right to access data
  • 11. 5 Existing Methods for Mitigating the Challenges 1) Resource Tagging 2) Isolating cloud instance & Sandboxing 3) RSA Signature [5] 4) SLA specifying the specific forensic Services
  • 12. 7 Tools Using for Challenge Mitigation 1) UFED Cloud Analyzer 2) FROST •Google My Activity and Facebook •iCloud and Google backup •Uber, Lyft •DJI drones •API logs •Guest firewall logs •Virtual disks •API logs •Guest firewall logs •Virtual disks
  • 13. 6 Existing Methods Limitations Related to Jurisdiction 1) International Commiunication and Cooperation Limitation – Only effective for non urent invetigations 2) Foreign Jurisdiction Remote Examination Limitation – Risk of damaging the target system
  • 14. 8 Future Developments 1) Method of Evidence Collection and Provenance Preservation for Cloud Using SDN and Blockchain Technology [6]. 2) Permission Block Chain Based Data Logging and Integrity Management System for Cloud Forensics [7].
  • 15. “ References [1] https://www.talend.com/resources/what-is-cloud-computing/ [2] https://kumarshivam-66534.medium.com/cloud-forensics-be18e14230de [3] A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions | ACM Computing Surveys. (2022). ACM Computing Surveys (CSUR). Retrieved from https://dl.acm.org/doi/fullHtml/10.1145/3361216 [4] Ruan, K., et al. Key Terms for Service Level Agreements to Support Cloud Forensics. in IFIP Int. Conf. Digital Forensics. 2012. Springer. [5] Lin, C.-H., C.Y. Lee, and T.-W. Wu, A cloud-aided RSA signature scheme for sealing and storing the digital evidences in computer forensics. International journal of security and its Applications, 2012. 6(2): p. 241-244. [6] M. Pourvahab and G. Ekbatanifard, "Digital Forensics Architecture for Evidence Collection and Provenance Preservation in IaaS Cloud Environment Using SDN and Blockchain Technology," in IEEE Access, vol. 7, pp. 153349-153364, 2019, doi: 10.1109/ACCESS.2019.2946978. [7] Park, Jun & Park, Jun & Huh, Eui. (2017). Block Chain Based Data Logging and Integrity Management System for Cloud Forensics. 149-159. 10.5121/csit.2017.71112. 15

Editor's Notes

  1. In simple terms - Cloud computing is a way to remotely store and access data and programming that utilizes the internet rather than hosting information on your computer’s hard drive. ************************************
  2. Private Cloud:  exclusively created and owned by a business. managed on a private network. private cloud could be on-site data centre, or even ask a third-party to host Public Cloud:  Service is solely offered by a third-party like Microsoft Azure manages all your hardware, software and other supporting infrastructure.  U can manage your services through your web browser.   Hybrid Cloud:  a perfect combination of public and private clouds provides your business with more flexibility and will help optimise your current infrastructure, security and compliance. ************************************************************************************************** Infrastructure as a Service (IaaS)  Provide IT infrastructure from a third-party cloud provider. rent servers, network, storage, virtual machines and more.  Platform as a Service (PaaS)  offers an environment for you to develop, test, deliver and manage your software applications with ease.  provide storage, network and databases needed for ur developments.  Software as a Service (SaaS)  is a method for delivering your software applications over the internet. cloud provider will host and manage the software application and infrastructure. Most of the time it’s a subscription basis on–demand service ***************************************
  3. cloud forensics is also just like any other forensics. Put into simple words, it means to collect and preserve the evidences that they are suitable to present in a court of law. ****************************
  4. Identifying cloud forensics evidences is more complicated than the normal computer forensics evidence identification because of the Decentralized property of cloud. If we take logs for an instance it provide the creation, storage, processing, and distribution of data across multiple data centres. The availability of cloud system logs are depending on the cloud service model. Therefore accessing the logs of a cloud is smtimes a challenge. Unlike normal cyber forensics incidents, when it comes to cloud forensics, most of the time the data is not physically accessible. So, in evidence identification, it is a challenge for FI ppl. ******************************************************
  5. Multitenancy means shared hosting, in which server resources are divided among different customers. Multitenancy is the opposite of single tenancy, where a software instance or computer system has 1 end user or group of users. So the challenge here is : since evidence could be located across several locations it makes evidence collection difficult. The distribution of evidence can be across multiple virtual hosts, physical machines, data centres and geographical and legal jurisdictions. Chain of custody implies how the evidence was collected, analysed and preserved at the aim of presenting the evidence in admissible way at the court of law. Challenge is : the distributed and multi-layered nature of cloud make it harder to verify the chain of custody. Also the verification of how the logs were collected, generated and stores along with who had the access to the logs is also challenging to be verified. Most CSPs r not motivated to aid FI cuz that could damage their reputation. In case of an incident, the cloud provider will focus upon restoring the service rather than preserving the evidence and handling it in a forensically sound manner. Moreover the integrity of evidence is also depending on the CSP. ************************************************************
  6. Involvement of international & local law enforcement parties : Sometimes FI ppl may hv to work with both international & local law enforcement parties to carry out the investigation which is very time and resource consuming. Bulletproof hosting : means storing illegal data in countries where it’s difficult for law enforcement agencies to take legal actions. Often located in corrupted countries where the country itself will provide lesser or no support in forensic investigation. Ukraine and Netherlands are two countries where law enforcement agencies can’t easily takedown. Right to access data : in different jurisdictions which can be varied from place to place. ********************************************************
  7. Unknown or not accessible physical location - The cloud resource consumers do the resource tagging to mark the information assets locations easily. Which can also be used by CSPs for their benefits. In other words when an incident occurs in a server that is in the other side of the world, it can be easier to handle all the laws, jurisdiction, chain of custody related challenges if that resource is been previously tagged. So it makes the investigation much easier. Multi-tenancy and resource sharing - One technique is to place isolating evidence in a Sandbox. **Instance Relocation, where an incident can be moved inside the cloud. Server Farming, which can be used to re-route the request between user and node. ** Chain of custody - Can be used to verify the chain of custody and data integrity Dependence on CSP + Jurisdiction Challenges - Good SLA guarantees benefit like accessibility and consistence.
  8. UFED Cloud Analyzer is a windows-based extraction and analysis tool. It allows you to extract, preserve and analyze public and private domain, social-media data, instant messaging, file storage, web pages and other cloud-based content using a forensically sound process. FROST is an OpenStack cloud computing platform forensics tool. It also requires no interaction with the operating system of guest virtual machines. And also the system is user-drive.
  9. That means its not good for investigations against DOS or DDOS attack cuz in that case we need the answers fast in real time to mitigate the ongoing attack. Rason is there are lot of agencies and even time zones to be consider. Damaging a system in a foreign jurisdiction is not good at all right.
  10. What they did was actually, encrypt all the data based on the sensitivity level and stored in the cloud server. For encryption they hv used, Sensitivity Aware Deep Elliptic Curve Cryptography algorithm. The proposed system is able to guarantee the integrity of data while processing more transactions than existing permission-less based blockchains.