Lecture 20 Cloud Forensics and IoT Forensics
Cloud Forensics
- Challenges: Discusses challenges in cloud and IoT forensics.
- Focus: Cloud forensics addresses data storage off-premises and shared obligations. IoT forensics centers on passive data collection and privacy threats.
IT Paradigm Shift
- Evolution: From custom-made, locally managed IT to standardized, centralized cloud services.
- Progression: On-premise IT → Shared Service Centers → Hosting → Outsourcing → Cloud Computing.
Cloud Model Characteristics
- Resource Pooling: Shared resources among multiple customers (multi-tenancy).
- Rapid Elasticity: Scalable services based on demand.
- On-Demand Self-Service: Instant access to cloud services.
- Measured Service: Pay-as-you-go model.
- Broad Network Access: Accessible via various devices through the Internet.
Cloud Service Models
- IaaS: Provider manages servers, storage, virtualization, and networking; customer manages OS, middleware, runtime, applications, and data.
- PaaS: Provider manages servers, storage, virtualization, OS, middleware, runtime, and networking; customer manages applications and data.
- SaaS: Provider manages all layers; customer manages data.
Cloud Computing & Digital Forensics Challenges
- Assumption: Traditional forensics assumes control and management of IT assets.
- Challenge: This assumption is not always valid in cloud computing.
Evidence Source Identification & Preservation
- Traditional Approach: Physical device seizure and byte-to-byte copy.
- Cloud Reality: Remote access to logical data representation.
- Issue: Data may be stored in multiple locations.
Issues in the Cloud
- Infeasibility: Obtaining physical device is impractical.
- Chain of Custody: Lack of investigator control over evidence audit trail.
- Encryption: Customer-held decryption keys complicate data access.
- Privacy: RAM contents may include non-relevant data.
- Jurisdiction: Hardware location may be outside the request's jurisdiction.
Deleted Data
- Conventional Forensics: Deleted data is often a valuable evidence source.
- Cloud Challenges: Volatility and elasticity make recovery difficult.
- Provider Policies: Some providers physically remove deleted data.
Data Retention
- Directive: Data Retention Directive (2006) may not cover cloud providers.
- GDPR: EU Cloud Code of Conduct relevance.
Cross-Organizational Cooperation
- ACPO Principle: Only forensically competent individuals should access digital evidence.
- Challenge: Proprietary technologies require provider involvement.
Additional Issues
- Jurisdiction: Cloud provider may be in a different jurisdiction.
- Time Zones: Establishing correct time is essential.
- Validation of Tools: Cloud providers use single hashing tools without external validation.
Evidence Presentation
- Report: Summarize findings for court submission.
- Jury Assessment: Reliability of methods and techniques.
- Challenge: Lack of standard evaluation methods in cloud forensics.
Conclusion: Cloud Forensics
- Crucial: Vital in modern digital investigations.
- Challenges: Requires addressing from forensics research, laws, cloud providers, and practitioners.
IoT Forensics
- Smart Homes: Integration of smart devices (thermostats, meters, etc.) managed through home area networks.
- Smart Cities: Use of sensors for monitoring (streetlights, air quality, etc.).
- Smart Wearables & Implanted Things: Medical Body Area Networks (BAN) for health monitoring and treatment.
Increase of Connected Devices
- Exponential Growth: Significant rise in IoT devices.
- Potential Crimes: Tampering with smart devices (medicine dispensers, pacemakers, utility meters), DoS attacks, and botnets.
Sources of Evidence
- Household Appliances: Dishwashers, kettles, baby monitors.
- Wearable Devices: Insulin monitors and pacemakers.
- City Appliances: Traffic lights and road temperature monitors.
Challenges for Digital Forensics
- Disparity: Wide variety of devices requires tools for data acquisition and analysis of different formats.
- Number of Devices: Increased number of items to be seized or investigated.
- Volume of Data: Large volumes for analysis, leading to backlogs.
- Expertise: Need for specialized tools and up-to-date training.
Location of Evidence
- Cloud Storage: IoT data utilizes cloud storage, increasing jurisdictional issues.
- Complexity: Devices used across different jurisdictions raise prosecution challenges.
Network Complexity
- Blurring Lines: Devices move between networks (BAN, PAN, HAN, NAN, MAN), leaving evidence across multiple locations.
Complexity of Investigations
- Evidence Location: Identifying where to look for evidence is challenging.
- Data Availability: Sources of evidence can become unavailable.
- Number of People Involved: Establishing the number of people communicating through devices is difficult.
Legal Aspect
- Legal Frameworks: Needed for investigators to access homes with compromised smart appliances.
- Homeowner Rights: Balancing investigation needs with homeowner rights.
IoT Forensics: Moving Forward
- IoT-Aware Triage Procedures: Develop specific triage processes for IoT devices.
- Automation: Automate acquisition and investigation processes.
- Legislation Updates: Update laws to address novel crimes.
- Standardization: Standardize data formats, protocols, and interfaces.
- Adapted Methods: Develop new investigative methods and processes.