Forensic Sciences


Cyber-Forensic Processes for Cloud Based Applications

Article Number: WEZ300970 Volume 06 | Issue 01 | April - 2023 ISSN: 2581-4273
07th Feb, 2023
10th Mar, 2023
25th Mar, 2023
28th Apr, 2023

Authors

Shrinjoy Goswami, Ankit Tripathi

Abstract

The field of digital forensics known as computer forensics deals with crimes performed on networks, computers, and digital storage media from companies like Apple (iCloud), Amazon (Amazon Web Service), Dropbox, Google, etc. It refers to a collection of methodical steps and techniques used to locate, collect, preserve, extract, interpret, document, and present evidence from computing equipment in a way that makes it admissible during a court case or other legal or administrative activity. Cybercrimes are occurring as a result of the increased use of technology in daily life. In the business world, fraud involving cloud computing is on the rise (gaining access to someone's storage systems, stealing log files, data sheets, account theft, data breach, data loss, etc.). When it comes to cloud-based mobile applications, the activities that are conducted are not only kept on the device, but also in a distant cloud. So, using forensically sound methodology is crucial to obtaining all of the evidence from the Cloud and the smart phone. The vast majority of people are unaware of how to protect their digital storage. This paper discusses importance of cloud forensics, collection and examination of the cloud data through UFED Cloud Analyzer. Keywords: Computer forensics, Dropbox, Digital storage media, Cybercrime, Data breach

Introduction

The use of Google Drives or cloud storage (for the storing of huge files, data, log files, etc.) has also grown over time. Social networking has evolved primarily over the years into a new type of online communication. In order to provide quicker innovation, adaptable resources, and scale economies, cloud computing, in its simplest form, is the supply of computing services via the Internet ("the cloud"), encompassing servers, storage, databases, networking, software, analytics, and intelligence (www.azure.microsoft.com).

Apple (iCloud), Amazon (Amazon Web Service), Dropbox, and Google are some of the most well-known providers of cloud storage. Data breaches caused by inadequate security procedures are a major cloud security issue. Companies must ensure that the online storage service they choose ensures total protection against data leaks and unauthorized access (www.scaler.com).

Investigations that are concentrated on crimes that primarily involve the cloud are referred to as cloud forensics. This can involve identity theft or data breaches (www.appdirect.com).To protect personal data, smart phones save forensic evidence on cloud storage services. The virtual memory-stored information for the application used to access a cloud computing system will be lost if a user leaves the cloud environment. In the cloud context, it makes the evidence extraction process more difficult.

To obtain the evidence, the forensic investigator looks at a number of potential cloud sites, including the hardware, network, hypervisor, virtual machines, and hosts OS. Three pieces of information, including log purpose in terms of justification, log technique in terms of use, and log time in terms of session ID and timestamp information, are the focus of gathering log information from the cloud (Sharma et al., 2020).

A developed cloud forensic process paradigm called Forensic Process as a Service (FPaaS) is built on the cloud-based Business Process Execution Language (BPEL). To help the dynamics and reconstruction of the evidence, the systematic digital forensic investigation model focuses on the investigation of computer fraud and cybercrime (Eleyan and Eleyan, 2015).

References

“Everything You Need to Know about Cloud Forensics.” https://www.appdirect.com/blog/cloud-forensics-and-the-digital-crime-scene#:~:text=What%20Is%20Cloud%20Forensics%20and,and%20can%20better%20preserve%20evidence.

“What Is Cloud Computing? A Beginner's Guide: Microsoft Azure.” | Microsoft Azure, https://azure.microsoft.com/en-in/resources/cloud-computing-dictionary/whatiscloudcomputing#:~:text=Simply%20put%2C%20cloud%20computing%20is,resources%2C%20and%20economies%20of%20scale.

Cloud Threat and Security Report: Addressing Cyber Risk and Fraud in ... https://www.oracle.com/a/ocom/docs/cloud/oracle-ctr-2020-addressing-cyber-risk-and-fraud-in-clud.pdf?source=%3Aow%3Ao%3Ah%3Amt%3A%3A%3ARC_WWMK210122P00009C0007%3AJC21_OCI_Q3_C14_M3401_S031YZ18_DS153_T11&lb-mode=overlay.

Eleyan, Amna, and Derar Eleyan. “Forensic Process as a Service (FPaaS) for Cloud Computing.” European Intelligence and Security Informatics Conference, Sept. 2015, https://doi.org/10.1109/eisic.2015.14.

Eleyan, Amna, and Derar Eleyan. “Forensic Process as a Service (FPaaS) for Cloud Computing.” European Intelligence and Security Informatics Conference, Sept. 2015, https://doi.org/10.1109/eisic.2015.14.

Scaler Topics - Technopedia for Your Mastermind, https://www.scaler.com/topics/cloud-computing/riskmanagementincloudcomputing/#:~:text=Risk%20management%20in%20cloud%20computing%20follows%20a%20process%20that%20involves,data%20breaches%2C%20availability%20and%20cyberattacks.

Sharma, Puneet, et al. “Enhanced Forensic Process for Improving Mobile Cloud Traceability in Cloud-Based Mobile Applications.” Procedia Computer Science, vol. 167, Elsevier BV, Jan. 2020, pp. 907–17. https://doi.org/10.1016/j.procs.2020.03.390.

Shop, Spy. “Cloud Data Extraction - UFED Cloud Analyzer.” Detective Store - Spy Equipment and Surveillance Gear, https://www.detective-store.com/ufed-cloud-analyzer-for-cloud-data-extraction-1284.html. 

How to cite this article?

APA Style
Chicago Style
MLA Style
DOI
URL

Create Your Password

We've sent a link to create password on your registered email, Click the link in email to start using Xournal.

Sign In

Forgot Password?
Don't have an account? Create Account

Create Account

Already have an account? Sign In

Forgot Password

Do you want to try again? Sign In

Publication Tracking