Impact of Cloud Computing On Digital Forensic Investigations
Impact of Cloud Computing On Digital Forensic Investigations
Investigations
Stephen O’shaughnessy, Anthony Keane
1. Introduction
Cloud computing is a rapidly evolving technological solution and busi-
ness model as evidenced by the upsurge in the global adoption of cloud
services. While cloud computing has its origins in mainframe comput-
ing and shares similarities with traditional Internet hosting, the ways
in which cloud services are offered differ considerably. Cloud consumers
can avail of self-provisioning, auto scaling and pay-per-use through ser-
292 ADVANCES IN DIGITAL FORENSICS IX
2.6 Shortfalls
The discussion above reveals that certain shortfalls during the var-
ious phases of the forensic process model can impact a cloud forensic
investigation. This could bring into question the validity of the evidence
presented in court. The shortfalls are:
The limited access or lack of access to cloud data that can provide
incomplete pictures of key events.
3. Other Issues
Certain other issues related to conducting digital forensic investiga-
tions in the cloud can affect the quality of the evidence retrieved. These,
in turn, could affect the credibility and admissibility of the recovered ar-
tifacts in a court of law.
298 ADVANCES IN DIGITAL FORENSICS IX
3.1 Multi-Tenancy
Multi-tenancy allows multiple clients to share a physical server and use
services provided by common cloud computing hardware and software
simultaneously. In some cases, multi-tenant infrastructures are a con-
cern because the sharing of resources is extensive, occurs at a very large
scale and involves multiple potentially vulnerable interfaces [2]. This
resource-sharing environment poses challenges to investigators who have
to concern themselves not only with the services used by a single cus-
tomer, but also the non-customer specific components of a multi-tenant
infrastructure and the resources shared with other customers. Shared
resources include processors and memory. Cloud service providers are
often unwilling to give an investigator access to shared memory because
it may contain data belonging to other customers and the release of this
data could violate confidentiality and privacy agreements.
bank documents and the penalties for violating the laws can include
criminal sanctions. In such cases, it may not be possible to retrieve all
the evidence pertaining to an incident. Garrie [10] cites jurisdictional
issues as a major challenge to conducting cloud forensic investigations.
check whether or not the cloud services are running as agreed upon by
both parties. If a problem occurs, the parties should be able to determine
which party is responsible and prove the existence of the problem to a
third party such as an arbitrator or a judge. This proposal is beneficial
to both parties: the customer can check whether or not the contracted
services are actually being provided and the service provider can handle
complaints and resolve disputes with more ease.
4.4 Forensics-as-a-Service
In a forensics-as-a-service (FaaS) model, the cloud service provider
should be responsible for forensic data acquisition or, at the very least,
provide support for forensic data acquisition. The service provider is
in a position to preserve and collect the data because it controls the
cloud infrastructure, not only the virtual machines, but also logging and
packet capture mechanisms, and billing records. The service could be
implemented by a cloud provider with little change to the existing cloud
infrastructure, and it would provide customers with the assurance that
high-quality forensic investigations could be conducted.
5. Conclusions
Several challenges exist when conducting forensic investigations in
cloud environments. These challenges are posed by the highly dynamic,
distributed, multi-jurisdictional and multi-tenant nature of cloud envi-
ronments. Failure to address these challenges could affect the credibility
and admissibility of the recovered digital evidence. Promising solutions
include the development of cloud-ready forensic tools and service level
agreements with built-in provisions for forensic investigations. However,
the most complete solution would be to ensure that service providers im-
plement forensics-as-a-service (FaaS) as a standard offering. This would
enable high-quality forensic investigations to be conducted using tradi-
tional digital forensic tools under existing service level agreements.
302 ADVANCES IN DIGITAL FORENSICS IX
References
[1] Association of Chief Police Officers, Good Practice Guide for
Computer-Based Evidence, London, United Kingdom, 2012.
[2] L. Badger, R. Bohn, S. Chu, M. Hogan, F. Liu, V. Kaufmann, J.
Mao, J. Messina, K. Mills, A. Sokol, J. Tong, F. Whiteside and D.
Leaf, U.S. Government Cloud Computing Technology Roadmap,
Volume II, Release 1.0 (Draft), Useful Information for Cloud
Adopters, NIST Special Publication 500-293, National Institute of
Standards and Technology, Gaithersburg, Maryland, 2011.
[3] D. Birk and C. Wegener, Technical issues of forensic investigations
in cloud computing environments, Proceedings of the Sixth IEEE In-
ternational Workshop on Systematic Approaches to Digital Forensic
Engineering, 2011.
[4] D. Bryan and M. Anderson, Cloud computing, A weapon of mass
destruction? presented at the DEFCON 18 Hacking Conference,
2010.
[5] B. Carrier and E. Spafford, Getting physical with the digital in-
vestigation process, International Journal of Digital Evidence, vol.
2(2), 2003.
[6] S. Garfinkel, The criminal cloud, MIT Technology Review, October
17, 2011.
[7] D. Garrie, Cloud computing and jurisdiction, Part 2: A primer,
Law and Forensics, Seattle, Washington (www.lawandforensics.
com/cloud-computing-jurisdiction-part-primer), 2012.
[8] A. Haeberlen, A case for the accountable cloud, ACM SIGOPS Op-
erating Systems Review, vol. 44(2), pp. 52–57, 2010.
[9] W. Jansen and T. Grance, Guidelines on Security and Privacy in
Public Cloud Computing, NIST Special Publication 800-144, Na-
tional Institute of Standards and Technology, Gaithersburg, Mary-
land, 2011.
[10] S. Liles, M. Rogers and M. Hoebich, A survey of the legal issues
facing digital forensic experts, in Advances in Digital Forensics V,
G. Peterson and S. Shenoi (Eds.), Springer, Heidelberg, Germany,
pp. 267–276, 2009.
[11] R. Lu, X. Lin, X. Liang and X. Shen, Secure provenance: The es-
sential of bread and butter of data forensics in cloud computing,
Proceedings of the Fifth ACM Conference on Computer and Com-
munications Security, pp. 282-292, 2010.
O’Shaughnessy & Keane 303