9 research outputs found

    Forensic Process as a Service (FPaaS) for Cloud Computing

    Get PDF
    Cloud computing is the technology that enables individuals and businesses to utilize computing services (e.g. online file storage, social networking sites, webmail)and a shared pool of resources (e.g. data storage space, networks, user applications) from anywhere over the Internet. Cloud computing has become popular as a cost-effective and convenient computing paradigm. However, cloud computing architecture is at its infancy stage and lacks support for security and forensic investigations. Due to the distributed and virtual nature of cloud, malicious activities can be carried out very easily and are very difficult to subsequently investigate. Cloud forensic investigators currently face challenges as they lack forensic tools and techniques in context of cloud. This highlights the need to develop the new research area of digital forensics in the cloud computing model. This paper presents a cloud forensic process that consists of (i) Identification, (ii) Collection/Acquisition and preservation, (iii) Examination/Processing and analysis, and (iv) Results dissemination phases. In addition, this paper develops the proposed forensic process as a service (FPaaS) using cloud-based Business Process Execution Language (BPEL) that combines the four phases/services into a new composite service called FPaaS

    The challenges of cloud computing in forensic science

    Get PDF
    Cloud computing (CC) is rapidly growing new information technology (IT) in private, public and especially in Government sectors internationally. CC technology facilitates rather than deploy and manage an in-house physical IT infrastructure by having local servers or personal devices to manage their softwares application. This new technology helps to transfer their traditional IT services model into remote, virtualised environments, which are often hosted and managed by the third parties. Therefore, CC environment of any organisation turn prospective opportunity for cyber attackers, which is become a primary challenges of CC in the protection of valuable data from different types of attacks. CC posed a serious risk and major challenge to digital investigators, also offers sufficient opportunities to investigators for better refining the forensic science. This study summarises the key areas of CC forensics science challenges and analyses by the researched performed by other researchers. The challenges also presented along with associated literature that particularly reference them. Finally the discussion and analysis, which is based on the study finding to consider the challenges provoke by the CC forensics science on our findings.Published onlin

    Study of forensic techniques in the cloud environment : implementation of functionalities on a model of tests

    Get PDF
    RESUMEN: Las técnicas forenses en entornos cloud son el estudio analítico de la estructura de un sistema de computación en la nube con el fin de, tras la ocurrencia de un error, encontrar las trazas que llevaron al sistema a ese punto. La infraestructura de computación en la nube es un cambio de paradigma en la computación que conlleva grandes retos para los investigadores debido, principalmente, a las características que hacen atractiva a esta tecnología. Sabiendo que este tipo de entorno es problemático, especialmente para la tecnología tradicional forense, en primer lugar se estudia este tipo de entono, la tecnología forense tradicional y los problemas y soluciones que se presentan en este cambio de paradigma, que es la computación en la nube. Posteriormente se crea un entorno de pruebas en el que se estudian dos programas para la detección de ciberataques a un entorno de DevStack; además, también se estudia la capacidad de generar registros de eventos en este tipo de entornos. Finalmente se analizan las evidencias generadas desde el entono, en el caso de uno de los programas no se llega a probar la configuración inicial que se pretendía, el resto de las pruebas resultan satisfactorias. Se concluye que este tipo de entornos aun necesitan mucho trabajo en el diseño e implementación de muchos tipos herramientas forenses que se utilizan en entornos tradicionales y necesitan su adaptación al cloud; además se enumeran una serie de otros posibles entornos de pruebas para las técnicas forenses en la computación en la nube.ABSTRACT: Forensic techniques in cloud environments are the analytical study of the structure of a cloud computing system in order to, after the occurrence of an error, find the traces that led the system to that point. The infrastructure of cloud computing is a paradigm shift in computing that entails great challenges for researchers due, mainly, to the characteristics that make this technology attractive. Knowing that this type of environment is problematic, especially for traditional forensic technology, first of all this type of environment is studied, the traditional forensic technology and the problems and solutions that arise in this paradigm shift, which is cloud computing. Subsequently, a test environment is created in which two programs for the detection of cyber attacks to a DevStack environment are studied; In addition, the ability to generate event records in this type of environment is also studied. Finally, the evidence generated from the environment is analyzed. In the case of one of the programs, it is not possible to prove the initial configuration that was intended, the rest of the tests are satisfactory. It is assumed that this type of environments still need a lot of work in the design and implementation of many types of forensic tools that are used in traditional environments and need their adaptation to the cloud; A number of other possible testing environments for forensic techniques in cloud computing are listed.Grado en Ingeniería de Tecnologías de Telecomunicació

    An exploration of virtual criminal investigations in Ghana : legal issues and challenges

    Get PDF
    The widespread cybercrime has caused changes and brought about a need for new investigative skills, laws and enforcement procedures to attack these obstacles. Since technological crimes committed through the information superhighway or the internet is evolving very rapidly, efficacious enforcement of cybercrime is becoming extremely challenging. Cybercrime is both a national and international issue and local legislation alone cannot be able to combat the menace. Digital evidence permeates every aspect of the average person's life in today's society and no matter what you are doing these days, a digital footprint is probably being created and contains some type of digital evidence that can be recovered through digital forensic investigation It requires stringent laws, skilled personnel, well-established institutions, and transnational response. To efficaciously combat cybercrime, countries, states or governments must establish an independent anti-cybercrime unit and design national guidelines for digital evidence collections to combat the canker. This thesis, therefore, presents an examination of the virtual crime or cybercrime investigation challenges and legal issues on electronic evidence in Ghana. The study examines the existing cybercrime laws and practices in Ghana and makes a comparative study from other jurisdictions. Also, the study draws a survey from the international legal framework on cybercrime and electronic evidence on various methods and procedures that can be used to conduct digital forensic search and seizure of electronic evidence and investigation when cybercrimes occur. Recommendations were made which include formulation of stringent laws, establishing the national Cybercrime investigation Strategy and policies, the establishment of national guidelines for digital evidence collections, develop anti-cybercrime tool-kit for the collection of digital evidence, the establishment of digital forensic training institutions in all regions of Ghana for hands-on skilled based training for law enforcement officers and judges to ensure efficiency in the process of digital forensic investigation and prosecution of cybercrimes in Ghana are given.Police PracticeD. Phil. (Criminal Justice

    Recent Developments in Federal Income Taxation: The Year 2014

    Get PDF
    This recent developments outline discusses, and provides context to understand the significance of, the most important judicial decisions and administrative rulings and regulations promulgated by the Internal Revenue Service and Treasury Department during 2014--and sometimes a little farther back in time if we find the item particularly humorous or outrageous. Most Treasury Regulations, however, are so complex that they cannot be discussed in detail and, anyway, only a devout masochist would read them all the way through; just the basic topic and fundamental principles are highlighted-- unless one of us decides to go nuts and spend several pages writing one up. This is the reason that the outline is getting to be as long as it is. Amendments to the Internal Revenue Code generally are not discussed except to the extent that (1) they are of major significance, (2) they have led to administrative rulings and regulations, (3) they have affected previously issued rulings and regulations otherwise covered by the outline, or (4) they provide an opportunity to mock our elected representatives; again, sometimes at least one of us goes nuts and writes up the most trivial of legislative changes. The outline focuses primarily on topics of broad general interest (to us, at least)--income tax accounting rules, determination of gross income, allowable deductions, treatment of capital gains and losses, corporate and partnership taxation, exempt organizations, and procedure and penalties. It deals summarily with qualified pension and profit sharing plans, and generally does not deal with international taxation or specialized industries, such as banking, insurance, and financial services
    corecore