Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies
dc.contributor.author | Dykstra, Josiah | |
dc.contributor.author | Sherman, Alan T. | |
dc.date.accessioned | 2019-02-19T16:54:23Z | |
dc.date.available | 2019-02-19T16:54:23Z | |
dc.date.issued | 2011-05-25 | |
dc.description | Annual ADFSL Conference on Digital Forensics, Security and Law. | en_US |
dc.description.abstract | The inevitable vulnerabilities and criminal targeting of cloud environments demand an understanding of how digital forensic investigations of the cloud can be accomplished. We present two hypothetical case studies of cloud crimes; child pornography being hosted in the cloud, and a compromised cloud based website. Our cases highlight shortcomings of current forensic practices and laws. We describe significant challenges with cloud forensics, including forensic acquisition, evidence preservation and chain of custody, and open problems for continued research. | en_US |
dc.description.sponsorship | We thank Simson Garfinkel and George Steele for helpful comments on early drafts. Sherman is supported in part by the Department of Defense under IASP Grant H98230-10-1-0359. | en_US |
dc.description.uri | https://commons.erau.edu/adfsl/2011/wednesday/10/ | en_US |
dc.format.extent | 11 pages | en_US |
dc.genre | conference papers and proceedings | en_US |
dc.identifier | doi:10.13016/m26uz2-cacf | |
dc.identifier.citation | Dykstra, Josiah and Sherman, Alan T., "Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies" (2011). Annual ADFSL Conference on Digital Forensics, Security and Law. 10. | en_US |
dc.identifier.uri | http://hdl.handle.net/11603/12821 | |
dc.language.iso | en_US | en_US |
dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
dc.relation.ispartof | UMBC Center for Information Security and Assurance (CISA) | |
dc.relation.ispartof | UMBC Faculty Collection | |
dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department | |
dc.rights | This item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author. | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) | * |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | cloud computing | en_US |
dc.subject | cloud forensics | en_US |
dc.subject | digital forensics | en_US |
dc.subject | case studies | en_US |
dc.title | Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies | en_US |
dc.type | Text | en_US |