Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Complex Recovery/ Data Reduction DFRWS Technical Issues Lots of info to be recovered in in deleted file space Partial data recovery: does this give.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/04/2011 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 8 04/11/2011 Security and Privacy in Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 10 09/15/2011 Security and Privacy in Cloud Computing.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 10 09/15/2011 Security and Privacy in Cloud Computing.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Evidence Collection & Admissibility Computer Forensics BACS 371.
INTRODUCTION TO CLOUD COMPUTING CS 595 LECTURE 6 2/13/2015.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Guide to Computer Forensics and Investigations, Second Edition
Teaching Computer Forensics Using Student Developed Evidence Files Anna Carlin Cal Poly Pomona.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 7 03/29/2010 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
Forensic and Investigative Accounting
Introduction to Cloud Computing and Secure Cloud Computing
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 3 09/03/2013 Security and Privacy in Cloud Computing.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.
Cloud Computing Cloud Security– an overview Keke Chen.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
What is FORENSICS? Why do we need Network Forensics?
Security in Practice Enterprise Security. Business Continuity Ability of an organization to maintain its operations and services in the face of a disruptive.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 16 10/11/2011 Security and Privacy in Cloud Computing.
 Cloud Computing is an emerging field wherein the focus is on providing virtualized resources as service.  Also the user is almost entirely blinded.
CS526: Information Security Chris Clifton December 4, 2003 Forensics.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Cloud Use Cases, Required Standards, and Roadmaps Excerpts From Cloud Computing Use Cases White Paper
Computer Forensics Principles and Practices
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
CLOUD COMPUTING Overview on cloud computing. Cloud vendors. Cloud computing is a type of internet based computing where we use a network of remote servers.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Slides copyright 2010 by Paladin Group, LLC used with permission by UMBC Training Centers, LLC.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
Virtual techdays INDIA │ august 2010 Cloud Computing – What and How ? Sandeep J Alur │ Microsoft India.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
CLOUD COMPUTING-3.
PRIVACYRELIABILIT Y SECURITY Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Guide to Computer Forensics and Investigations Fifth Edition Chapter 13 Cloud Forensics All slides copyright Cengage Learning with additional info from.
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
RECLAIM CONTROL OF MOBILE AND DISTRIBUTED DATA January 13, 2016.
CIT 180 Security Fundamentals Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
CyberLaw. Assignment Review Cyber LawCyberLaw 6/23/2016 CyberLaw 3 Securing an Organization  This Chat: CyberLaw and Compliance –Forensics –Privacy.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Clouding with Microsoft Azure
University of Colorado at Colorado Springs
11. Looking Ahead.
Chapter 6: Securing the Cloud
PhD Oral Exam Presentation
Cloud Security– an overview Keke Chen
VIRTUALIZATION & CLOUD COMPUTING
Cloud security issues & challenges – public cloud
U.S. Department of Justice
Forensics Week 6.
Introduction to Digital Forensics
1 Advanced Cyber Security Forensics Training for Law Enforcement Building Advanced Forensics & Digital Evidence Human Resource in the Law Enforcement sector.
Presentation transcript:

Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing

Data Forensics in a Cloud Goal: Examine the data forensics problem in cloud computing Assignment #6: Lu et al., Secure Provenance: The Essential Bread and Butter of Forensics in Cloud Computing, AsiaCCS /22/20112Fall 2011 Lecture 10 | UAB | Ragib Hasan

Cloud Forensics: An overview Related reading: Ruan et al., “Cloud Forensics: An Overview”, /22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan3

Digital Forensics Digital Forensics is the “application of science to the – identification, – collection, – examination, and – analysis of data while preserving the integrity of information and maintaining a strict chain of custody for the data.” [Kent 2006] 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan4

Cloud Forensics Cloud forensics is a cross-disciplinary subject – an overlapping of cloud computing and digital forensics 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan5

Modeling crime in a cloud Cloud crime is any crime involving cloud computing [Ruan et al., 2011] Cloud can be the subject, object, or tool of crime – Subject: Cloud is attacked by external attackers – Object: Cloud provider attacks clients – Tool: Cloud computing used to attack external parties 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan6

Cloud forensics is useful for … Investigation – Cloud crime and policy violations – Reconstructing events in the cloud 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan7

Cloud forensics is useful for … Troubleshooting – Pinpointing the physical location of data and hosts in a cloud – Unearthing the root cause of problems – Security incidence handling 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan8

Key Goals of Cloud Forensics Identifying data related to a particular user Attributing data to its creator/owner Identifying intrusions/reconstructing events 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan9

Many issues complicate cloud forensics Technical issues Organizational issues Legal issues Question: Why is cloud computing different? 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan10

Recap: Why is cloud forensics different? Data stored in different jurisdictions Data is replicated many times for redundancy Separation/segregation of duties/control between client and cloud provider is not clear Clouds are multi-tenant environments 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan11

Multi-tenancy and Multi-jurisdicions create complicated scenarios No longer possible to grab the disk and image it for suspect’s data Sophisticated collaboration with cloud provider and possibly international law enforcement departments needed The law is not clear yet 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan12

Technical issues [see Ruan et al.] Data collection: – Finding, labeling, recording, and mining forensic data from a cloud is difficult – Information resides in many different locations, some of which may be offshore – Data collection from a cloud provider may violate privacy laws protecting other customers 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan13

Technical issues Data Collection – Access to cloud data / forensic logs may vary according to cloud model IaaS – easy access to data for forensic investigation PaaS – less flexible access through the cloud API SaaS – Almost no access from client side 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan14

Technical issues Elastic, Static, and Live Forensics – Time Synchronization is very difficult when data resides in multiple locations, machines, data centers – Log format unification is difficult – Recovering deleted data is almost impossible 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan15

Technical issues Evidence segregation – Very difficult to identify only the data belonging to a particular suspect – Separating log files per client is a huge management overhead – Weak registration allows criminals to use cloud almost anonymously – Tools do not exist yet 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan16

Technical issues Investigating virtual machines – Clients don’t use physical hardware directly, rather use virtualized hardware and virtual machines – The evidence may be spread across the client’s machine – Even clients cannot locate the physical position of a piece of data at any time 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan17

Legal issues Multi-jurisdiction and tenancy – One of the top legal concerns in digital forensics in clouds SLAs – Service level agreements still do not include support for cloud forensics 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan18

Clouds do provide some new opportunities for forensics Cost effectiveness: Cloud can be used for forensics as a service Data abundance: There are many replicas of a data object in a cloud. So, deletion does not remove all traces of data 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan19

Clouds do provide some new opportunities for forensics Performance: – Faster data processing, even for smaller law enforcement departments – Reduced total cost of investigation 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan20

Open Problems Creating a framework for a regulatory compliant cloud – i.e., a cloud that allows same level of forensic scrutiny as required by regulations such as Sarbanes-Oxley act, HIPAA, GLB, etc. Creating a privacy-preserving forensic audit framework 09/22/2011Fall 2011 Lecture 10 | UAB | Ragib Hasan21