{"id":872,"date":"2013-03-19T10:44:10","date_gmt":"2013-03-19T10:44:10","guid":{"rendered":"http:\/\/digitalfire.ucd.ie\/?p=872"},"modified":"2013-05-14T13:18:15","modified_gmt":"2013-05-14T13:18:15","slug":"digital-forensic-investigation-and-cloud-computing","status":"publish","type":"post","link":"https:\/\/dfire.ucd.ie\/?p=872","title":{"rendered":"Digital Forensic Investigation and Cloud Computing"},"content":{"rendered":"<p>Earlier this year, researchers from the Digital Forensic Investigation Research Group had a chapter published in the book &#8220;<em>Cybercrime and Cloud Forensics: Applications for Investigation Processes<\/em>&#8220;. \u00a0There were contributions from authors discussing practical as well as theoretical aspects of digital crime, investigation, side channel attacks, law, international cooperation, and the future of crime and Cloud computing environments.<\/p>\n<p><a href=\"http:\/\/digitalfire.ucd.ie\/wp-content\/uploads\/2013\/03\/shutterstock_105612011.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-883 alignleft\" alt=\"Lock Key\" src=\"http:\/\/digitalfire.ucd.ie\/wp-content\/uploads\/2013\/03\/shutterstock_105612011-300x213.jpg\" width=\"300\" height=\"213\" srcset=\"https:\/\/dfire.ucd.ie\/wp-content\/uploads\/2013\/03\/shutterstock_105612011-300x213.jpg 300w, https:\/\/dfire.ucd.ie\/wp-content\/uploads\/2013\/03\/shutterstock_105612011.jpg 500w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>DigitalFIRE specifically focused on how Cloud computing is likely to affect current digital forensic investigators. Instead of assuming that Cloud environments will completely\u00a0revolutionize the way crime and digital investigations are conducted, we\u00a0assessed\u00a0Cloud environments in terms of current digital investigation models. Indeed, new challenges to investigations were found to exist when considering Cloud service models, but many of these challenges stem from increased connectivity and less control. In terms of technology, some challenges exist in Cloud environments that were previously not <em>as<\/em>\u00a0common; however, Cloud environments also potentially bring a number of benefits for digital\u00a0investigators\u00a0that may ultimately make some types of investigations on Cloud environments easier than on stand-alone systems.<\/p>\n<p>Our chapter aims to be a high-level introduction into the fundamental concepts of both digital forensic investigations and cloud computing for non-experts in one or both areas. Once fundamental concepts are established, we begin to examine Cloud computing security-related questions; specifically how past security challenges are inherited or solved by cloud computing models, as well as new security challenges that are unique to Cloud environments. Next, an analysis is given of the challenges and opportunities Cloud computing brings to digital forensic investigations. Finally, the <a href=\"http:\/\/www2.tech.purdue.edu\/cpt\/courses\/tech581a\/physical.pdf\" target=\"_blank\">Integrated Digital Investigation Process<\/a> model is used as a guide to illustrate considerations and challenges during an investigation involving cloud environments.<\/p>\n<p>James JI, Shosha AF, Gladyshev P. (2013). Digital Forensic Investigation and Cloud Computing. In K. Ruan (Ed.),\u00a0<i>Cybercrime and Cloud Forensics: Applications for Investigation Processes<\/i>\u00a0(pp. 1-41). Hershey, PA: IGI Global.\u00a0<a href=\"http:\/\/doi.org\/10.4018\/978-1-4666-2662-1.ch001\" target=\"_blank\">doi:10.4018\/978-1-4666-2662-1.ch001<\/a> [<a href=\"http:\/\/www.igi-global.com\/chapter\/digital-forensic-investigation-cloud-computing\/73956\">L<\/a><a href=\"http:\/\/www.igi-global.com\/chapter\/digital-forensic-investigation-cloud-computing\/73956\">INK<\/a>][<a href=\"http:\/\/digitalfire.ucd.ie\/?attachment_id=1081\">PDF<\/a>]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this year, researchers from the Digital Forensic Investigation Research Group had a chapter published in the book &#8220;Cybercrime and Cloud Forensics: Applications for Investigation Processes&#8220;. \u00a0There were contributions from authors discussing practical as well as theoretical aspects of digital crime, investigation, side channel attacks, law, international cooperation, and the future of crime and Cloud [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":883,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[27,30,34],"tags":[42,64,43,44],"class_list":["post-872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-forensics","category-windows-forensics","category-dfire-publications","tag-cloud-computing","tag-cloud-forensics","tag-digital-forensic-investigation","tag-i-stride"],"_links":{"self":[{"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/posts\/872"}],"collection":[{"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=872"}],"version-history":[{"count":15,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/posts\/872\/revisions"}],"predecessor-version":[{"id":1120,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/posts\/872\/revisions\/1120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/media\/883"}],"wp:attachment":[{"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=872"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=872"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=872"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}