• DocumentCode
    147342
  • Title

    A digital forensic model for providing better data provenance in the cloud

  • Author

    Trenwith, Philip M. ; Venter, H.S.

  • Author_Institution
    Software Dept., GEW Technol., Pretoria, South Africa
  • fYear
    2014
  • fDate
    13-14 Aug. 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    The cloud has made digital forensic investigations exceedingly difficult due to the fact that data may be spread over an ever-changing set of hosts and data centres. The normal search and seizure approach that digital forensic investigators tend to follow does not scale well in the cloud because it is difficult to identify the physical devices that data resides on. In addition, the location of these devices is often unknown or unreachable. A solution to identifying the physical device can be found in data provenance. Similar to the tags included in an email header, indicating where the email originated, a tag added to data, as it is passed on by nodes in the cloud, identifies where the data came from. If such a trace can be provided for data in the cloud it may ease the investigating process by indicating where the data can be found. In this research the authors propose a model that aims to identify the physical location of data, both where it originated and where it has been as it passes through the cloud. This is done through the use of data provenance. The data provenance records will provide digital investigators with a clear record of where the data has been and where it can be found in the cloud.
  • Keywords
    cloud computing; digital forensics; cloud computing; data provenance; digital forensic model; email header; search and seizure approach; Cloud computing; Computational modeling; Computers; Digital forensics; Open systems; Protocols; Servers; Cloud Computing; Digital Forensic Investigation; Digital Forensics; annotations; bilinear pairing technique; chain of custody; data provenance;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security for South Africa (ISSA), 2014
  • Conference_Location
    Johannesburg
  • Print_ISBN
    978-1-4799-3383-9
  • Type

    conf

  • DOI
    10.1109/ISSA.2014.6950489
  • Filename
    6950489