Academia.eduAcademia.edu

Outline

Title Formalization of SLAs for Cloud Forensic Readiness

2016

Abstract

Cloud Computing is one of the most pervasive ICT changes of the last few years. Usually, Clouds offer a variety of Services, which are accessible over the Internet. These Services are regulated by some contracts called Service Level Agreements between Service providers and customers. The SLAs have already been introduced in Service Oriented Architectures in situations where some computing services need to be structured and regulated. In an SLA, the constraints of use, the duties and responsibilities of the parties involved, the charges and the service levels to guarantee, etc., are clearly stated by dedicated clauses. Despite the efforts made in systems security and the standardisation of SLAs, Cloud Services continues to suffer from various cybercriminal attacks, and unfortunately this phenomenon is likely to escalate within the next few years. It becomes urgent to take some countermeasures against these illegal practices to increase both the customer trust and quality of services of such new technologies. One of the alternatives for this phenomenon is to provide an efficient cloud Forensic Readiness System (FRS) to prevent and alert the provider and/or customer of any suspect attacks or strange behaviour. Much attention has been given to FRSs and they have certainly moved from simple log files and monitoring to very sophisticated components involving both human experts and computer analysis tools. In this paper we study the effect of SLAs on FRSs. As SLAs may be different from one jurisdiction to another we believe that FRSs should also comply with jurisdiction for more efficiency and speed of isolating and resolving forensic cases. Therefore, we propose an FRS that takes into account automatically SLAs and issue warnings and alerts to its users (providers and consumers) based on the jurisdiction and the nature of security breach and attacks. These SLAs are presented to the system as a set of rules (clauses). This will also prevent illegal data transfers and communications among different jurisdictions. Part of this paper will be dedicated to the formalisation of these SLAs and study its consequences on the FRS architecture and functioning. The rest of the paper will be dedicated to the design and development of the FRS reference architecture integrating the proposed SLA formal model.

References (36)

  1. References ACPO --Association of Chief Police Officers (2007) "Good Practice Guide for Computer Based Electronic Evidence", [online], http://www.acpo.police.uk/asp/policies/Data/ACPO%20Guidelines%20v18.pdf Ambhire, V. R., Meshram, B. B. (2012) "Digital Forensic Tools", IOSR Journal of Engineering, Vol 2, No. 3, pp 392--398.
  2. Baset, S.A. (2012) "Cloud SLAs: present and future", ACM SIGOPS Operating Systems Review, Vol 46, No. 2, pp 57--66.
  3. Birk, D. (2011). "Technical challenges of forensic investigations in cloud computing environments", Workshop on Cryptography and Security in Clouds, pp 1--6.
  4. Birk, D., and Wegener, C. (2011). "Technical issues of forensic investigations in cloud computing environments", IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, pp 1--10.
  5. Casey, E. (2011) Digital Evidence and Computer Crime, 3rd Edition, Academic Press, New York.
  6. CSA -- Cloud Security Alliance (2011) "Security Guidance for Critical Areas of Focus in Cloud Computing v 3.0.", [online], https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf CSA --Cloud Security Alliance (2013) "The Notorious Nine Cloud Computing Top Threats in 2013", [online], https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_T op_Threats_in_2013.pdf
  7. Czajkowski, K., Foster, I., Kesselman, C., Sander, V., Tuecke, S. (2002) "SNAP: A protocol for negotiating service level agreements and coordinating resource management in distributed systems", Job scheduling strategies for parallel processing, Springer Berlin Heidelberg, pp 153--183.
  8. De Marco, L., Kechadi, M--T., and Ferrucci, F. (2013) "Cloud Forensic readiness: Foundations", Proceedings of the 5th International Conference on Digital Forensics & Cyber Crime, LNICST series, to appear.
  9. De Marco, L., Ferrucci, F., and Kechadi, M--T. (2014) "Reference Architecture for a Cloud Forensic Readiness System", EAI Endorsed Transactions on Security and Safety, ICST, to appear.
  10. Dykstra, J., and Sherman, A.T. (2012) "Acquiring Forensic Evidence from Infrastructure--as--a--Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Techniques", Proceedings of the 12th Annual DF Research Conference, Digital Investigation, Vol 9, pp 90-98.
  11. Dykstra, J., and Sherman, A.T. (2013) "Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform", Proceedings of the 13th Annual DFRWS Conference, Digital Investigation, Vol 10, pp 87--95.
  12. Endicott--Popovsky B., Frincke, D., Taylor, C. (2007) "A Theoretical Framework for Organizational Network Forensic Readiness", Journal of Computers volume, Vol 2, No. 3, pp 1--11.
  13. European Commission -- Directorate General Communications Networks, Content and Technology - Unit E2 - Software and Services, Cloud (2013) "Cloud Computing Service Level Agreements --Exploitation of Research Results", [online], Editor: Dimosthenis Kyriazis, http://ec.europa.eu/information_society/newsroom/cf/dae/document.cfm?doc_id=2496
  14. Garfinkel, S. L. (2010). "Digital forensics research: The next 10 years", Digital Investigation, Vol 7, pp 64--73.
  15. Gaudel, M.C. (1994) "Formal specification techniques", Proceedings of the 16 th International Conference on Software Engineering, pp 223--227.
  16. Ghosh, N., Ghosh, S.K. (2012) "An approach to identify and monitor SLA parameters for storage--as--a--service cloud delivery model", Globecom Workshops (GC Wkshps), pp 724--729.
  17. Grobler, T., Louwrens, B. (2007) "Digital forensic readiness as a component of information security best practice", Proceedings of New Approaches for Security, Privacy and Trust in Complex Environments, 22 nd International Information Security Conference, Vol 232, pp 13--24.
  18. Jansen, W., and Ayers, R. P. (2007) "SP 800--101. Guidelines on Cell Phone Forensics", NIST Technical Report, Gaithersburg, MD, United States.
  19. Ishakian, V., Lapets, A., Bestavros, A., Kfoury, A. (2011) "Formal Verification of SLA Transformations", 2011 IEEE World Congress on Services, pp 540--547.
  20. Mell, P., and Grance, T. (2011) "Final Version of NIST Cloud Computing Definition", [online], http://csrc.nist.gov/publications/nistpubs/800--145/SP800--145.pdf
  21. Mishra, A. K., Matta, P., Pilli, E. S., and Joshi, R. C. (2012). "Cloud Forensics: State--of--the--Art and Research Challenges", International Symposium on Cloud and Services Computing, pp 164--170.
  22. Mouton, F., and Venter, H.S. (2011) "A prototype for achieving digital forensic readiness on wireless sensor networks", Proceedings of IEEE AFRICON, pp 1--6.
  23. NIJ --National Institute of Justice (2008) "Electronic Crime Scene Investigation Guide: A Guide for First Responders", [online], http://www.nij.gov/publications/pages/publication--detail.aspx?ncjnumber=219941 OVF --Open Virtualization Format Standard [online], http://www.dmtf.org/standards/ovf
  24. Palmer, G. (2001) "A Road Map for Digital Forensic Research", Report from the First Digital Forensic Workshop. Paschke, A. and Bichler. M. (2008) "Knowledge representation concepts for automated SLA management", Decision Support Systems, Vol 46, Issue 1, pp 187--205.
  25. Patel, P., Ranabahu, A. H., and Sheth, A. P. (2009) "Service Level Agreement in Cloud Computing", [online], http://corescholar.libraries.wright.edu/knoesis/78
  26. Qualemnis, "Definitions", [online], http://www.qualemnis.com/QPI--definitions.htm Reddy, K., and Venter, H.S. (2013) "The architecture of a digital forensic readiness management system", Computers & Security, Vol 32, pp 73--89.
  27. Reilly, D., Wren, C., and Berry, T. (2010) "Cloud computing: Forensic challenges for law enforcement", Proceedings of the International Conference on Internet Technology and Secured Transactions (ICITST), pp 1--7.
  28. Reilly, D., Wren, C., and Berry, T. (2011). "Cloud computing: Pros and cons for computer forensic investigations", International Journal Multimedia and Image Processing, Vol 1, No. 1, pp 26--34.
  29. Rowlingson, R. (2004) "A ten step process for forensic readiness", International Journal of Digital Evidence, Vol 2, No. 3, pp 1-28.
  30. Ruan, K., Carthy, J., Kechadi T. and Crosbie, M. (2011) "Cloud forensics: an overview", Proceedings of the 7 th IFIP International Conference on Digital Forensics, Advances in Digital Forensics, Vol. 7.
  31. Ruan, K., Carthy, J., Kechadi, T., and Baggili, I. (2013). "Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results", Digital Investigation, Vol 10, No. 1, pp 34--43.
  32. Skene, J., Skene, A., Crampton, J., and Emmerich, W. (2007) "The monitorability of service--level agreements for application--service provision", Proceedings of the 6th international workshop on Software and performance, pp 3--14.
  33. Tan, J. (2001) "Forensic Readiness, Technical report", [online], @Stake Organization, Cambridge, MA, USA http://isis.poly.edu/kulesh/forensics/forensic_readiness.pdf
  34. Trenwith, P.M., and Venter, H.S. (2013) "Digital forensic readiness in the cloud", Proceedings of Information Security for South Africa, pp.1--5.
  35. Unger, T., Leymann, F., Mauchart, S., Scheibler, T. (2008) "Aggregation of Service Level Agreements in the Context of Business Processes", Proceedings of the 12th International Conference on Enterprise Distributed Object Computing, pp 43--52.
  36. Valjarevic, A., and Venter, H.S. (2011) "Towards a Digital Forensic Readiness Framework for Public Key Infrastructure systems", Proceedings of Information Security South Africa (ISSA), pp 1--10.