Cybercrime and Cloud Forensics: Applications for Investigation Processes

Cybercrime and Cloud Forensics: Applications for Investigation Processes

Keyun Ruan (University College Dublin, Ireland)
Release Date: December, 2012|Copyright: © 2013 |Pages: 348
ISBN13: 9781466626621|ISBN10: 1466626623|EISBN13: 9781466626935|DOI: 10.4018/978-1-4666-2662-1


While cloud computing continues to transform developments in information technology services, these advancements have contributed to a rise in cyber attacks; producing an urgent need to extend the applications of investigation processes.

Cybercrime and Cloud Forensics: Applications for Investigation Processes presents a collection of research and case studies of applications for investigation processes in cloud computing environments. This reference source brings together the perspectives of cloud customers, security architects, and law enforcement agencies in the developing area of cloud forensics.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Cloud Adoption
  • Cloud Forensics
  • Cybercrime
  • Digital Forensics
  • Public Cloud
  • Security Architecture
  • Security as a Service

Reviews and Testimonials

Edited by Ruan shortly after he completed his PhD from the University College Dublin, Ireland, this volume contains 14 essays introducing readers to the science and practice of a brand new field. The chapters examine issues and applications concerning new security models for cloud-based storage and the related concepts of forensic readiness, virtual forensics, and search and seizure. Other chapters delve into the ramifications of the legal process required for a cloud investigation and data recovery. Practices based on actual experience are offered in chapters by researchers at the U. of Bristol, the UK; Demokritus U. of Thrace, Greece; the U. of Pernambuco, Brazil; and EBSL Technologies International. The other contributors are at academic and commercial institutions in Europe, Australia, and North America.

– Annotation ©2013 Book News Inc. Portland, OR

As information security professionals, we are still struggling to find an acceptable risk management strategy that encourages cloud computing for enterprises. The best part of this scholarly publication is that it starts with an introduction to the ecosystem, and by the end, has completely covered the promises, challenges, potential downsides, and strategies of cloud forensics.

– Phoram Mehta, Computing Reviews

Table of Contents and List of Contributors

Search this Book:
Editorial Advisory Board
Table of Contents
Eugene H. Spafford
Keyun Ruan
Keyun Ruan
Chapter 1
Joshua I. James, Ahmed F. Shosha, Pavel Gladyshev
This chapter aims to be a high-level introduction into the fundamental concepts of both digital forensic investigations and cloud computing for... Sample PDF
Digital Forensic Investigation and Cloud Computing
Chapter 2
Mark Crosbie
The goal of this chapter is to explain the challenges that the forensic investigator faces when investigating Cloud Crime and how they can learn... Sample PDF
Hack the Cloud: Ethical Hacking and Cloud Forensics
Chapter 3
Fred Cohen
Digital forensic evidence is subject to a variety of challenges, and these challenges apply in the Cloud as anywhere else. This chapter is an... Sample PDF
Challenges to Digital Forensic Evidence in the Cloud
Chapter 4
Richard Adams
Cloud computing is just one of many recent technologies that have highlighted shortcomings in the development of formal digital forensic processes... Sample PDF
The Emergence of Cloud Storage and the Need for a New Digital Forensic Process Model
Chapter 5
Kirsten Ferguson-Boucher, Barbara Endicott-Popovsky
This chapter focuses on a theoretical approach to proactive evidence collection and presents a conceptual approach for the Cloud. Forensic Readiness... Sample PDF
Forensic Readiness in the Cloud (FRC): Integrating Records Management and Digital Forensics
Chapter 6
Diane Barrett
Just about every technology magazine and article published today mentions virtualization or cloud computing. Technically, the two are different but... Sample PDF
Security Architecture and Forensic Awareness in Virtualized Environments
Chapter 7
Josiah Dykstra
Despite a growing adoption of cloud computing, law enforcement and the judicial system are unprepared to prosecute cloud-based crimes. This chapter... Sample PDF
Seizing Electronic Evidence from Cloud Computing Environments
Chapter 8
Ivan Orton, Aaron Alva, Barbara Endicott-Popovsky
For the emerging field of cloud forensics, the development of validated and repeatable scientific processes for conducting cloud forensic... Sample PDF
Legal Process and Requirements for Cloud Forensic Investigations
Chapter 9
Dean Gonsowski
Cloud Computing will be a disruptive technology that will ultimately change the face of computing with a market approaching $300 billion over the... Sample PDF
Compliance in the Cloud and the Implications on Electronic Discovery
Chapter 10
Theodoros Spyridopoulos, Vasilios Katos
Data acquisition and data recovery are essential to any e-discovery or digital forensic process. However, these two aspects seem to be considerably... Sample PDF
Data Recovery Strategies for Cloud Environments
Chapter 11
Forensics as a Service  (pages 266-290)
Jon Rav Gagan Shende
In today’s dynamic information technology system, one area of tremendous focus and recent growth has been that of the cloud-computing model in its... Sample PDF
Forensics as a Service
Chapter 12
Forensics as a Service  (pages 291-312)
Dener Didoné, Ruy J. G. B. de Queiroz
Cloud computing as a paradigm shift is transforming how services are being delivered. In this chapter, the authors present a Forensics as a Service... Sample PDF
Forensics as a Service
Chapter 13
Fabio Marturana, Simone Tacconi, Giuseppe F. Italiano
With the global diffusion of cybercrime, the ever-growing market penetration of high-performance and low-cost personal digital devices, and the... Sample PDF
A Forensic-as-a-Service Delivery Platform for Law Enforcement Agencies
Chapter 14
Keyun Ruan
Cloud computing is a major transition, and it comes at a unique historical and strategic time for applying foundational design thinking to secure... Sample PDF
Designing a Forensic-Enabling Cloud Ecosystem
About the Contributors

Author(s)/Editor(s) Biography

Keyun Ruan worked as a PhD researcher at the Center of Cybersecurity and Cybercrime Investigation (University College, Dublin) and in cloud forensics at the Cyber Security Research Lab (EADS). She was among the first in the world to work on this emerging area. Professor Ruan has given talks around the world in both academic and industry conferences, including CloudEXPO Europe and Silicon Valley, Cloud Futures held at Microsoft Research Headquarters, Cloud Security Alliance Congress, RSAConference Europe, Campus Party Europe, the ADFSL Conference on Digital Forensics Security and Law, the International Conference on Digital Forensics and Cyber Crime, the IFIP International Conference on Digital Forensics. Keyun is now Chairperson and CRO of New York based XENSIX Inc, research scientist at University College Dublin, and research partner at EADS. She is an active member of the Cloud Security Alliance, member of the board of Cloud Security Alliance Ireland, and is leading the Cloud Security Alliance Incident Management and Forensics Working Group. She is an active contributor to the NIST Cloud Computing Program, and a Technical Lead of the NIST Cloud Forensics Working Group. She is also a semi-professional artist and holds a diploma in Art and Design from the National College of Art and Design, Ireland.