3.9 Article

Forensic analysis of cloud-native artifacts

Journal

DIGITAL INVESTIGATION
Volume 16, Issue -, Pages S104-S113

Publisher

ELSEVIER SCI LTD
DOI: 10.1016/j.diin.2016.01.013

Keywords

Cloud forensics; Google docs format; Reverse engineering; Cloud-native artifacts; kumodocs; kumodd

Ask authors/readers for more resources

Forensic analysis of cloud artifacts is still in its infancy; current approaches overwhelming follow the traditional method of collecting artifacts on a client device. In this work, we introduce the concept of analyzing cloud-native digital artifactsedata objects that maintain the persistent state of web/SaaS applications. Unlike traditional applications, in which the persistent state takes the form of files in the local file system, web apps download the necessary state on the fly and leave no trace in local storage. Using Google Docs as a case study, we demonstrate that such artifacts can have a completely different structure-their state is often maintained in the form of a complete (or partial) log of user editing actions. Thus, the traditional approach of obtaining a snapshot in time of the state of the artifacts is inherently forensically deficient in that it ignores potentially critical information on the evolution of a document over time. Further, cloud-native artifacts have no standardized external representation, which raises questions with respect to their long-term preservation and interpretation. (C) 2016 The Authors. Published by Elsevier Ltd on behalf of DFRWS.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.9
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available