• Nenhum resultado encontrado

Analysis on Digital Crime and Emergence of Technical Challenges with Cloud Computing

N/A
N/A
Protected

Academic year: 2017

Share "Analysis on Digital Crime and Emergence of Technical Challenges with Cloud Computing"

Copied!
6
0
0

Texto

(1)

Analysis on Digital Crime and Emergence of

Technical Challenges with Cloud Computing

Divya avanthi

rashmi.chandrika13@gmail.com

Abstract - The most recent technology release Forbes, Cisco reveals adoption of cloud computing in a global scale. As for storage estimated the average data storage consumed per average household grow from 464 gigabytes. One of the cloud key effects the benefit of digital marketing is that is has provided marketers to approach potential customers at the same time example who is watching TV and texting on the couch used to be out of reach of digital marketers. Organizations deploying infrastructure into remote virtualized environments hosted by third parties significant implications for forensic investigators vendors’ enforcement corporate compliance and audit departments. Digital forensic assumes control and management assets during the conduct of an investigation and overviews the cloud computing how establishes digital procedures will be validated in investigation

Keywords: Digital Marketing, Cloud Computing, Investigation Model, Cybercrime, Attacks.

1- Introduction

Cloud computing is a significant potential to revolutionize the way organizations provision their information technology infrastructure. Migration to cloud computing involves replacing much of the traditional IT hardware found in an organization’s data centre including servers, racks, network switches and air conditioning units with virtualized, remote, on-demand software services, configured for the particular needs of the organization. These services can be hosted and managed by the user organization or by a third-party provider. Consequently, the software and data comprising the organization’s application may be physically stored across many different locations, potentially with a wide geographic distribution.

There have been several predictions of substantial market growth in cloud services over the next few years. Spending on cloud services will grow by 30% in 2011 and Gartner press release forecast cloud service worldwide revenue to reach $68.3 billion in 2010, an increase of 16.6% from the 2009 revenue of $58.6 billion, and goes on to claim that cloud service revenues will reach $148.8 billion in 2014. A study at the end of 2010 predicted that within the next three years, approximately 40% of Small and Medium Businesses (SMBs) expect to be using three or more cloud services and will have migrated their data into the cloud (Kazarian & Hanlon, 2011). There is some speculation that new and SMBs will benefit the most in the coming years, with cloud computing allowing these organizations to utilize.

(2)

The US financial market is the biggest and the majority of business is yet to adopt tech payment mechanisms in the cloud and web based systems that seek to integrate with accounting systems of business is also paving the way toward a more digital financial world. In short businessmen or even consumer will not require paper any more to deal with bills and payments startups and financial service startups have been developing frameworks and systems that shall link private accounting systems with banks financial services providers and even card companies. Towards Big data and analytics the information that will be generated from such financial systems will be significant for all participants in the market. Predicted that there may come a time very soon when pay checks bank accounts tax collection payments records analytics and almost everything related to money will be operated through cloud and digital systems instead of paper physical servers. Mobile wallets such as Apple Pay Google wallet will be ahead of many other similar services as the companies that make the iPhone and Android OS will have a significant edge. IBM is already focusing on cloud and consultancy business and it can be forecast that Big Blue can make a lot of cash just by contributing to the new ecosystem with its cloud services.

2- Section II

Related Work: The most recent technology forecasts released by Forbes Cisco Forrester and Gartner all reveal that there is a widespread adoption of cloud computing going in global scale. Unanimous in their predications with over one third of digital content in the world estimated to be stored in the cloud by 2016 last year 7%. As for storage estimated the average data storage consumed per average household will grow from 464 gigabytes last 2011 to 3.3 terabytes in 2016. Not every household will have large enough storage devices to accommodate that much data majority of will hosted on the cloud. One of the key effects of the cloud that will benefits digital marketing is provided marketers with more venues from which to approach potential customers while at the same tie also allowed more individuals to become potential customers for instance a person who is watching TV and texting on the couch used to be out of reach of digital marketers. The cloud has made it possible for the same person to access his data through his phone and his TV without even leaving the couch.

Multi device support with the cloud marketers no longer need to worry about hard drives or other local storages as their files can be accessed and shared over the internet using any internet capable device they have on hand. Security is no longer an issue with the cloud as large and established companies have started entering the market bringing with them their expertise and skills with regard to safeguarding the security of their customers. The real crowning gem of cloud computing technology is its cost efficiency no need to spend hundreds of thousands of dollars on setting up and infrastructure as a web enabled device and internet access is all needed to get a cloud based system.

SEPCO marketing social media uses HubSpot in order to take full control of the company marketing and steer it in the right direction of particular use to are HubSpot powerful analytics and marketing tools. Whistler BalckComb is a ski resort situated 125km north of Vancouver manages around nine different social networks resort takes several multi-tiered social media campaigns to promote their resort and attract customers and they use the HootSuite Dashborad to manage everything from a single place. Whole foods has managed to attract over 50thousand followers on pinterest and has used almost 970 pins to create a personality for the brand that reflects their core values marketing director, controls all of the company’s pins from wherever is inspiration strikes.

Multi-channel marketing automation for publishing and promoting content that helps marketers engage customers across several different channels particularly mobile and social needs automation for the intelligent algorithms that sequence how that engagement happens.

Content management tools to create and manage the content and engagement tools that can be deployed across different channels.

Social media tools for listening to and engaging with social media networks to tap into consumer conversations responding with custom content or social media advertising.

(3)

3. SECTION III

The ability to scale and provision computing power dynamically in a cost efficient way the ability of the consumer to make the most of that power without having to manage the underlying complexity of the technology.

3.1. Cloud digital Process Model: Association of police officers defines principles of digital practice that No action taken by law enforcement agencies or their agents should change data held on a computer or storage media which subsequently be relied in court. Circumstances like where a person finds it necessary to access original data held on computer storage media that person must be competent to do and give evidence explaining the relevance and the implications. Audit trail record of all processes applied to computer based electronic evidence should be created and persevered. Person in-charge of the investigation has overall responsibility for ensuring that the law and these principles are adhere.

First digital forensics Research defined the term digital forensics investigation process model which they deemed cold be applied to all investigations in both research and practitioners, model identifies a linear process includes stages of identification preservation collection examination analysis and presentation and based upon the physical crime scene principles and method consists of phases that are broken into five groups readiness is concerned with ensuring the investigator has the correct training, deployment specifies for detecting and incident has occurred and beginning the process of conducting an investigation, physical crime scene investigation digital crime scene investigation and review.

Identification is the first step in the digital investigation process determine that a potential criminal act has taken place involving computer based systems relate to traditional crimes or activity augmented by the use of Information Technology crimes. Identification detected by intrusion detection systems monitoring and profiling of an audit of a computer system is not just concerned with digital forensics, detection of suspicious events in a cloud will depend on the deployment adopted the form of cloud services used. Private cloud infrastructure providers may be better placed to tune the intrusion detection system for the particular suite of services deployed which meets the organizations needs and public cloud a multi-layered strategy may be necessary users can monitor for suspicious events occurring with the services they are using.

Storage capacity of digital cloud: pre-requisite of evidence preservation is to have available sufficient secure storage capacity for the data gathered to be archive driven by increased device capacity and reduced cost is increasingly challenging for investigators imposes extra costs on investigators with the responsibility to store and curate the data quite apart from the increasing amount of investigator time required to examine. Investigating authorities could resort to is the use of public clouds to store evidence from both legal and technical perspective investigators will need to address the rules and regulations regarding data protection and privacy issues impact on evidence stored in the cloud.

3.2. Custody cloud: custody provides the documentary for the entire lifetime of evidence discovered during an investigation guidelines stipulate that the documentation include the evidence was gathered and managed. When an investigator assumes control of digital electronic artifacts suspected to be pertinent computer powering down the computer by issuing a command to the operating system causing a staged shutdown and removing the power source causing an immediate halt. Storage devices can be removed from the computer and examined separately custody documentation will typically refer the devices isolated and disconnected from a power supply with little risk of loss.

(4)

Figure 2 Digital Crime cloud Computing

Virtualization of data storage in a cloud makes complex to identify and isolate the portions of the one or more physical storage devices and an interface between the virtual storage and the investigator could exist Google have employed the Google file system to store their customers data in the cloud. The virtualization affects the privacy of other users of the cloud whose data may be inadvertently gathered during the investigation access of non-relevant data from a cloud environment may contravene local privacy data protection.

4- SECTION IV

Problem Definition: Cyber-crime is a traditional form of fraud or forgery though in a cyber-crime context relates specifically to crimes committed over electronic communication networks and information systems. Cloud computing investigators examine and interpret digital evidence to solve crime issued in National Institute of standard and technology, the report was prepared by Forensic science working group an international body of cloud aims to initiate on forensic concern in cloud computing ecosystems. Long-term goal of effort build to understand consensus on the high-priority. Distributed computing digital is stored and transmitted enables non-demand network access to shared pool of configurable computing resources including servers storage include cost savings and greater flexibility in business and consumers employ information technology.

4.1 Attacks occur in cloud computing: Cloud services concentrate data in one place that become attractive targets justifying large investment in a hacker time and resources of European Network and Information Security agency. State-exhaustion attacks such as TCP SYN flood and idle session attacks abuse the state full nature of TCP to exhaust resources in servers load balancers and firewalls during DDos attacks. By using an amplification technique called DNs reflection an attackers botnet can send our DNs query of about 60bytes to an open recursive DNS resolver that generate response message sent to the victim of upto 4,000 bytes increasing the amount of attack traffic by a factor of more than 60. The DNS protocol is ideal for this type of attack because queries can be sent with a spoofed source address using user datagram protocol.

(5)

online auction fraud identity theft financial and telecommunications fraud credit card fraud and various other schemes. Computer fraud is one of the most rapidly increasing forms of computer crime commonly referred to as internet fraud essentially computer internet fraud scheme that uses one or more components of the internet such as chat rooms email message boards web sites to present fraudulent transactions or to transmit the proceeds of fraud to financial institutions or the other connected with the scheme internet fraud. Nigerian mail fraud victim receives e-mail from an alleged son of a deceased Nigerian head of state happens to be the heir millions of dollars that are hidden in accounts all over the world. The e-mail recipient is lead to believe to receive some of the fortune that asked in exchange is a lawyers fee of several thousand dollars in order to claim the money. Perhaps the most common example of this type of fraud occurs when a victim is expecting a large payoff for helping to move millions of dollars out of foreign country.

4.3. Risk with the Cloud: Security risks listed by the network and information security agency in a report on the cloud possibly attack on isolation mechanisms the compromising of management interfaces would give attackers access to a potentially greater set of resources than in traditional networked computing and possibility of a malicious insider within a cloud service provider. All the arguably an exacerbation of traditional information security concerns rather than something brought about exclusively by cloud computing mentioned operation high roller fraud based on denial of service attack to make a machine or network resource unavailable to its intended users that has nothing specific to the cloud. Cloud computing infrastructure is indeed today almost exclusively owned by private companies’ aspects and commercial interests should not be underestimated some of cloud services US based company Amazon for instance is presumed to account for 1% of all internet consumer traffic. Traditional frauds such as tax welfare fraud cost citizens a few hundred dollars a year with such crime the costs of defence monetary equivalent of prevention much less than the amounts stolen. Transitional frauds such as payment card fraud cost citizens a few tens of dollars a year online payment card fraud typically runs at basic points of turnover of e-commerce firms.

5- SECTION V

Case Study: Cloud can assist to solve many problems for business case, to become a decision maker for one there are many options available to put business in cloud allowing to virtual desktop and network space time. Cloud marketing software must work with professionals to create a strategy and a strategic framework for branding sales and marketing efforts and use actionable management tool, safe to choose cloud for business provides secure high performance access to business applications significantly to reduce operational costs and capital expenditure by eliminating on-site servers software and maintenance can also extend the life of current workstation investments and also gives users secure data from interconnected device. Cloud vendors provide new tools to help enterprise information build manage monitor cloud services are designed to help information technology executives to work with their budgets and workforces utilized better in terms of business operations. Cloud in human resource management has many options available for modern cloud based HRMS solution with a complete suite of human resource functionality like training and business documentation tools.

Expensive costs in IT must accommodate increasing demand for new IT capabilities and services however economic uncertainty and rising costs of materials can cause a road block presents an economic advantage by providing IT solutions at a lower cost and increased access to data from virtually device. Mobility restrictions is an increasing Information Technology challenge more completely than cloud computing business for increased mobility of business applications on smartphones which rely on timely updates only available form cloud based software management. Businesses are eager for increased mobility of business applications on smartphones which rely on timely updates only available from cloud based software management solve the challenge of mobility by providing service updates almost immediately productivity gains. Organization data sharing can lead to misinformed decision making cloud computing resolves facilitating faster more extensive data sharing between departments and within the business.

Conclusion

(6)

Investigation would be hampered due to the lack of guidance concerning methods and software tools to retrieve evidence and also need legal issues regarding clouds data retention and laws to be re-examined of cloud technologies. Impact of the cloud on digital crime how to alter and develop alternative framework and guidelines as well as to combine cybercrime in the cloud.

Reference:

[1] Baryamureeba, V., & Tushabe, F. (2004). The Enhanced Digital Investigation Process. Paper presented at the Digital Forensic Research Workshop 2004, Baltimore, Maryland.

[2] Bessani, A., Correia, M., Quaresma, B., André, F., & Sousa, P. (2011). DepSky: dependable and secure storage in a cloud-of-clouds. Paper presented at the Sixth conference on Computer systems, Salzburg, Austria. Biggs, S., & Vidalis, S. (2009).

[3] Cloud Computing: The Impact on Digital Forensic Investigations. Paper presented at the 4th International Conference for Internet Technology and Secured Transactions, London, United Kingdom.

Biggs, S., & Vidalis, S. (2010). Cloud Computing Storms. International Journal of Intelligent Computing Research (IJICR), 1(1), 63-72.

[4] Butler, C. W., Heckman, C., & Thorp, A. (2010). Cloud Computing: eDiscovery Issues and Other Risk. eDiscovery Alert (White Paper) Retrieved February 2, 2012, from http://www.orrick.com/fileupload/2740.pdf

N. N. Indira PriyaDarsini M.Tech( Information Technology )from Gurunank Engineering College B.Tech (Computer Science Engineering) from Bhoji Reddy College of Engineering. She is having Eight years of academic experience currently working as Asst Prof at Vignan Bharathi Institute of Technology, she has guided many UG & PG students. Her research areas include Data Mining, Networks,Testing, Databases and published four articles in International Journals.

.

Imagem

Figure 1 Cloud Computing Digital Marketing
Figure 2 Digital Crime cloud Computing

Referências

Documentos relacionados

The probability of attending school four our group of interest in this region increased by 6.5 percentage points after the expansion of the Bolsa Família program in 2007 and

Abstract. The emergence of the Internet as a ubiquitous means of communication fostered the growth of new business and service models based on Cloud Computing.

The questionnaire has a number of branching points to differentiate among pilgrims who have walked the Camino, carried mobile devices while walking, carried smartphones

Analysis of the atmospheric electrical activity of the storm shows a high average frequency of both cloud-to- cloud lightning and cloud-to-ground lightning, comparable to

The structure of the remelting zone of the steel C90 steel be- fore conventional tempering consitute cells, dendritic cells, sur- rounded with the cementite, inside of

Optimal cloud security practices should include encryption of sensitive data used by cloud- based virtual machines; centralized key management that allows the user

Pais e filhos apresentam semelhanças ao nível das dimensões, Relacional, Equilíbrio Pessoal e Tradicionalismo, e diferenças na Preocupação Social (mais

With this in mind, the cloud computing system (OpenStack) described in this chapter aims to provide the core features of a cloud computing architecture, On-demand self- service