%0 Conference Proceedings %T Identifying Evidence for Cloud Forensic Analysis %+ George Mason University [Fairfax] %A Liu, Changwei %A Singhal, Anoop %A Wijesekera, Duminda %Z Part 3: Network and Cloud Forensics %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 13th IFIP International Conference on Digital Forensics (DigitalForensics) %C Orlando, FL, United States %Y Gilbert Peterson %Y Sujeet Shenoi %I Springer International Publishing %3 Advances in Digital Forensics XIII %V AICT-511 %P 111-130 %8 2017-01-30 %D 2017 %R 10.1007/978-3-319-67208-3_7 %K Cloud forensics %K Attack scenarios %K OpenStack %Z Computer Science [cs]Conference papers %X Cloud computing provides benefits such as increased flexibility, scalability and cost savings to enterprises. However, it introduces several challenges to digital forensic investigations. Current forensic analysis frameworks and tools are largely intended for off-line investigations and it is assumed that the logs are under investigator control. In cloud computing, however, evidence can be distributed across several machines, most of which would be outside the control of the investigator. Other challenges include the dependence of forensically-valuable data on the cloud deployment model, large volumes of data, proprietary data formats, multiple isolated virtual machine instances running on a single physical machine and inadequate tools for conducting cloud forensic investigations.This research demonstrates that evidence from multiple sources can be used to reconstruct cloud attack scenarios. The sources include: (i) intrusion detection system and application software logs; (ii) cloud service API calls; and (iii) system calls from virtual machines. A forensic analysis framework for cloud computing environments is presented that considers logged data related to activities in the application layer as well as lower layers. A Prolog-based forensic analysis tool is used to automate the correlation of evidence from clients and the cloud service provider in order to reconstruct attack scenarios in a forensic investigation. %G English %Z TC 11 %Z WG 11.9 %2 https://inria.hal.science/hal-01716407/document %2 https://inria.hal.science/hal-01716407/file/456364_1_En_7_Chapter.pdf %L hal-01716407 %U https://inria.hal.science/hal-01716407 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-DF %~ IFIP-WG11-9 %~ IFIP-AICT-511