DOI QR코드

DOI QR Code

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar (Department of Computer Science, Federal Polytechnic) ;
  • Deborah U. Ebem (Department of Computer Science, University of Nigeria ) ;
  • Francis S. Bakpo (Department of Computer Science, University of Nigeria) ;
  • Modesta Ezema (Department of Computer Science, University of Nigeria)
  • Received : 2024.06.05
  • Published : 2024.06.30

Abstract

Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

Keywords

References

  1. Josiah Alexander. Digital Forensics for Infrastructure-as-a-Service Cloud Computing. PhD thesis, University of Maryland, Baltimore., 2013. 
  2. Soltan Abed Alharbi. Proactive System for Digital Forensic Investigation. PhD thesis, University of Victoria, 2014.
  3. Syed Ahmed Ali, "Challenges in Cloud Forensics," in International Conference on Cloud and Big Data Computing, pp. 6-10, Barcelona, 2018. 
  4. Sameera Almulla, Youssef Iraqi, and Andrew Jones, "a State-of-the-Art Review of Cloud Forensics," JDFSL, vol. 9, no. 4, p. 22, 2014.
  5. Saad Alqahtany and Nathan Clarke, "A forensicallyenabled IAAS cloud computing architecture," in 12th Australian Digital Forensics Conference., p. 10, Perth, Western Australia, 2014. Australian Digital Forensics Conference. 
  6. Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich, "A forensic acquisition and analysis system for IaaS: Architectural model and experiment," in Proceedings - 2016 11th International Conference on Availability, Reliability and Security, ARES 2016, 2016. 
  7. Michael Armbrust, Ion Stoica, Matei Zaharia, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy Katz, Andy Konwinski, Gunho Lee, David Patterson, and Ariel Rabkin, "A view of cloud computing," Communications of the ACM, vol. 53, no. 4, p. 50, 2010. 
  8. Kweku Kwakye Arthur. Considerations Towards the Development of a Forensic Evidence Management System. PhD thesis, University of Pretoria, 2010. 
  9. Noam H. Arzt, "Case Study for Cloud Computing Solutions in Public Health," in CSTE Annual Conference Raleigh, NC June 5, 2019 Noam, p. 20, 2019. 
  10. Blog BMC. "Homogeneous vs. Heterogeneous Clouds: Pros, Cons, and Differences - BMC Blogs,". 
  11. Aqil Burney, Muhammad Asif, and Zain Abbas, "Forensics Issues in Cloud Computing," no. August, pp. 63-69, 2016. 
  12. Pooja Chopra, R P S Bedi, and Rule Base, "Applications Of Fuzzy Logic in Cloud Computing : A Review," vol. 6, no. 11, pp. 1083-1086, 2017. 
  13. Yuri Demchenko, Fatih Turkmen, Cees De Laat, and Mathias Slawik, "Defining Intercloud Security Framework and Architecture Components for MultiCloud Data Intensive Applications," pp. 945-952, 2017. 
  14. Povar Digambar. A Novel Digital Forensic Framework for Cloud Computing Environment. PhD thesis, BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, PILANI, 2015. 
  15. Josiah Dykstra and Alan T Sherman, "Design and implementation of FROST : Digital forensic tools for the OpenStack cloud computing platform," Digital Investigation, vol. 10, no. 13, pp. S87-S95, 2013. 
  16. Majda Elhozmari and Ahmed Ettalbi, "Towards a Cloud Service Standardization to ensure interoperability in heterogeneous Cloud based environment," vol. 16, no. 7, pp. 60-70, 2016. 
  17. Jannatul Ferdous, Fuad Newaz Khan, Karim Mohammed Rezaul, Maruf Ahmed Tamal, Abdul Aziz, and Pabel Miah, "A Hybrid Framework for Security in Cloud Computing Based on Different Algorithms," vol. 2020, pp. 1-7, 2020. 
  18. Clint p. Garrison, Digital forensics for network, internet and cloud computing. Elsevier Inc, 2010. 
  19. TLP Green. "Exploring Cloud Incidents,". Tech. Rep. June, 2016. 
  20. George Grispos and William Bradley Glisson, "Calm Before the Storm : The Challenges of Cloud Computing in Digital Forensics," International Journal of Digital Crime and Forensics (IJDCF), vol. 4, no. 2 , pp. 28-48, 2012. 
  21. Priyesh Kanungo, "Design Issues in Federated Cloud Architectures," International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, no. 5, pp. 937-939, 2016. 
  22. Victor Rigworo Kebande. A Novel Cloud Forensic Readiness Service Model by. PhD thesis, UNIVERSITY OF PRETORIA Department, 2017. 
  23. Tahar Kechadi and Le-Khac Nhien-An, "Digital Forensic Investigations in the Cloud A Proposed Approach for Irish Law Enforcement," no. January 2016, 2015. 
  24. Karen Kent and Souppaya. "GUIDE TO COMPUTER SECURITY LOG MANAGEMENT,". tech. rep., 2006. 
  25. Chong Mao Lihua Liu, Zhengjun Cao, "A Note on One Outsourcing Scheme for Big Data Access Control in Cloud," I.J. of Electronics and Information Engineering, vol. 9, no. 1, pp. 36-45, 2018. 
  26. David Lillis, Brett A Becker, Tadhg O Sullivan, Mark Scanlon, Tadhg O'Sullivan, and Mark Scanlon, "Current Challenges and Future Research Areas for Digital Forensic Investigation," in 11th ADFSL Conference on Digital Forensics, Security and Law ( CDFSL 2016), no. May, 2016. 
  27. Ben Martini and Kim-Kwang Raymond Kwang Raymond Choo, "An integrated conceptual digital forensic framework for cloud computing," Digital Investigation, vol. 9, no. 2, pp. 71-80, 2012. 
  28. Peter Mell and Timothy Grance. "The NIST Definition of Cloud Computing Recommendations of the National Institute of Standards and Technology,". tech. rep., 2011. 
  29. Cody Miller, Dae Glendowne, David Dampier, and Kendall Blaylock, "Forensicloud: An Architecture for Digital Forensic Analysis in the Cloud," Journal of Cyber Security and Mobility, vol. 3, no. 3, pp. 231 - 262, 2014. 
  30. Martin Mulazzani. New challenges in digital forensics : online storage and anonymous communication by. PhD thesis, 2014. 
  31. NIST. "Cloud Computing Forensic Science Challenges,". tech. rep., National Institute of Standards and Technology, USA, 2014. 
  32. Eric Opoku Osei and James Benjamin HayfronAcquah, "Cloud Computing Login Authentication Redesign," International Journal of Electronics and Information Engineering, vol. 1, no. 1, pp. 1-8, 2014. 
  33. P K Sahoo and R K Chottray, "Research Issues on Windows Event Log," vol. 41, no. 19, pp. 23-29, 2012. 
  34. Sonal Saokar, Sulabha Patil, and Rajiv Dharaskar, "DESIGN FRAMEWORK OF DIGITAL FORENSIC FOR CLOUD COMPUTING : A REVIEW," vol. 3, no. 12, pp. 91-93, 2015. 
  35. Jitendra Singh, "Cyber-Attacks in Cloud Computing: A Case Study," International Journal of Electronics and Information Engineering, vol. 1, no. 2, pp. 78-87, 2014. 
  36. Michael Smit, Bradley Simmons, and Marin Litoiu, "Distributed , Application-level Monitoring for Heterogeneous Clouds using Stream Processing," 2013. 
  37. Stelios Sotiriadis and Nik Bessis, "An Inter-Cloud Bridge System for Heterogeneous Cloud Platforms," Future Generation Computer Systems, 2015. 
  38. Adel Nadjaran Toosi, Rodrigo N Calheiros, and Rajkumar Buyya, "Interconnected Cloud Computing Environments: Challenges, Taxonomy, and Survey," ACM Computing Surveys, vol. 47, no. 7, p. 57, 2014. 
  39. Jingxin K Wang, Jianrui Ding, and Tian Niu, "Interoperability and Standardization of Intercloud Cloud Computing," 2012. 
  40. Cheng Yan, "Cybercrime forensic system in cloud computing," in International Conference on Image Analysis and Signal Processing, IASP 2011, no. Dc, pp. 612-613, 2011. 
  41. Feng Yu, Casey Stella, and Kriss A Schueller, "A Design of Heterogeneous Cloud Infrastructure for Big Data and Cloud Computing Services,"OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING, vol. 1, no. 2, 2014. 
  42. Shams Zawoad, Ragib Hasan, and Cloud Cover, "Trustworthy Digital Forensics in the Cloud," Computer, vol. 49, no. 3, pp. 78-81, 2016. 
  43. Shams Zawoad, Ragib Hasan, and Anthony Skjellum, "OCF: An Open Cloud Forensics Model for Reliable Digital Forensics," Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015, no. July, pp. 437-444, 2015.