Emerging Technologies for Developing Countries. First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings

Research Article

Cloud Digital Forensics Evaluation and Crimes Detection

  • @INPROCEEDINGS{10.1007/978-3-319-67837-5_16,
        author={Raja Jabir and Omar Alfandi},
        title={Cloud Digital Forensics Evaluation and Crimes Detection},
        proceedings={Emerging Technologies for Developing Countries. First International EAI Conference, AFRICATEK 2017, Marrakech, Morocco, March 27-28, 2017 Proceedings},
        proceedings_a={AFRICATEK},
        year={2017},
        month={10},
        keywords={Cloud computing Virtual layer Digital forensics Cloud forensics Forensics analysis Dropbox},
        doi={10.1007/978-3-319-67837-5_16}
    }
    
  • Raja Jabir
    Omar Alfandi
    Year: 2017
    Cloud Digital Forensics Evaluation and Crimes Detection
    AFRICATEK
    Springer
    DOI: 10.1007/978-3-319-67837-5_16
Raja Jabir1,*, Omar Alfandi1,*
  • 1: Zayed University
*Contact email: M80006379@zu.ac.ae, Omar.Alfandi@zu.ac.ae

Abstract

Cloud computing is one of the significant topics of today’s era; due to the enhancement it brings to the Information Technology world. This transformation lead to its rapid adoption by different sectors, ranging from enterprise to personal usage. Organizations are constantly looking for ways to increase productivity with optimum cost; which derived the need for Cloud environments and its underlying virtualized infrastructure. With the increase usage of Cloud based infrastructure, criminals utilized its anonymity factor to hide their criminal activities; escaping from legal actions. This paper highlights the obstacles experienced during Cloud virtual layer forensics acquisition and analysis, due to lack of specialized forensics tools. We have developed a framework to aid in assessing the virtual environment readiness for forensics investigation and examine the applicability of existing state-of-the-art forensics tools to Cloud environment. The paper reveals the need for having specialized forensics tools for Cloud infrastructure forensics.