Cloud forensics relationship between the law enforcement and cloud service providers
conference contribution
posted on 2018-01-01, 00:00authored byYounis Salim Saed Al Husaini, Matthew Warren, Lei PanLei Pan
Cloud computing is one of the most important advances in computing in recent history. In contrast, cybercrime has developed side by side and rapidly in recent years, where the battle has exposed the exploitation of cloud computing by terrorist groups as a technique for fraud, stealing money and information, leaking secret documents, hacking government websites, recruiting new members and other activities. They are taking advantage of the gap between cloud service providers (CSPs) and law enforcement (LEAs), where LEAs cannot work without the cooperation of CSPs since their relationship is not one challenge that can be addressed, indeed should be on the legal, organisational and technical level which effect on the cooperation among them. Therefore, it is essential to enhance the Cloud forensics relationship between LEAs and CSPs. This research addresses the need for a unified collaborative model to facilitate proper investigations and explore and evaluate existing different models involved in the relationship between LEAs and CSPs as a participant in investigations. Moreover, it investigates how their relationship affects the path of the real-world forensic cases.
History
Pagination
79-88
Location
Melbourne, Victoria
Start date
2018-10-10
End date
2018-10-11
ISBN-13
9780648457008
Language
eng
Publication classification
E1 Full written paper - refereed
Editor/Contributor(s)
Warren M
Title of proceedings
CWAR 2018 : Proceedings of the 17th Australian Cyber Warfare Conference
Event
Australian Cyber Warfare. Conference (2018 : 17th : Melbourne, Victoria)