Cloud Forensics : Isolating Cloud Instance
Abstract—Cloud computing has been the trending model for storing, accessing and modifying the data over the Internet in the recent years. Rising use of the cloud has generated a new concept related to the cloud which is cloud forensics. Cloud forensics can be defined as investigating for evidence over the cloud, so it can be viewed as a combination of both cloud computing and digital forensics. Many issues of applying forensics in the cloud have been addressed. Isolating the location of the incident has become an essential part of forensic process. This is done to ensure that evidence will not be modified or changed. Isolating an instant in the cloud computing has become even more challenging, due to the nature of the cloud environment. In the cloud, the same storage or virtual machine have been used by many users. Hence, the evidence is most likely will be overwritten and lost. The proposed solution in this paper is to isolate a cloud instance. This can be achieved by marking the instant that reside in the servers as "Under Investigation". To do so, cloud file system must be studied. One of the well-known file systems used in the cloud is Apache Hadoop Distributed File System (HDFS). Thus, in this paper the methodology used for isolating a cloud instance would be based on the HDFS architecture.
Keywords: cloud computing; digital forensics; cloud forensics
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Copyright & License
All Research Plus Journals (RPJ) publish open access articles under the terms of the Creative Commons Attribution (CC BY-SA 4.0) https://creativecommons.org/licenses/by-sa/4.0/ License which permits use, distribution and reproduction in any medium, provided the original work is properly cited & ShareAlike terms followed.
Copyright on any research article in a journal published by a RPJ is retained by the author(s). Authors grant RPJ a license to publish the article and identify itself as the original publisher. Upon author(s) by giving permission to RPJ either via RPJ journal portal or other channel to publish their research work in RPJ agrees to all the terms and conditions of https://creativecommons.org/licenses/by-sa/4.0/ License and terms & condition set by RPJ.
3rd party copyright
It is the responsibility of author(s) to secure all necessary copyright permissions for the use of 3rd-party materials in their manuscript.
Research Plus Journals Open Access articles posted to repositories or websites are without warranty from RPJ of any kind, either express or implied, including, but not limited to, warranties of merchantability, fitness for a particular purpose, or non-infringement. To the fullest extent permitted by law RPJ disclaims all liability for any loss or damage arising out of, or in connection, with the use of or inability to use the content.