Cloud Digital Forensic Readiness: An Open Source Approach to Law Enforcement Request Management
- URL: http://arxiv.org/abs/2507.04174v1
- Date: Sat, 05 Jul 2025 22:06:42 GMT
- Title: Cloud Digital Forensic Readiness: An Open Source Approach to Law Enforcement Request Management
- Authors: Abdellah Akilal, M-Tahar Kechadi,
- Abstract summary: Cloud Forensics presents a multi-jurisdictional challenge that may undermines the success of digital forensic investigations.<n>The growing volumes of domiciled and foreign law enforcement (LE) requests, the latency and complexity of formal channels for crossborder data access are challenging issues.<n>We propose an abstract architecture for a Cloud Law Enforcement Requests Management System (CLERMS)
- Score: 0.4972323953932129
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cloud Forensics presents a multi-jurisdictional challenge that may undermines the success of digital forensic investigations (DFIs). The growing volumes of domiciled and foreign law enforcement (LE) requests, the latency and complexity of formal channels for crossborder data access are challenging issues. In this paper, we first discuss major Cloud Service Providers (CSPs) transparency reports and law enforcement guidelines, then propose an abstract architecture for a Cloud Law Enforcement Requests Management System (CLERMS). A proof of concept of the proposed solution is developed, deployed and validated by two realistic scenarios, in addition to an economic estimation of its associated costs. Based on available open source components, our solution is for the benefit of both CSPs and Cloud Service Consumers (CSCs), and aims to enhance the due Cloud Digital Forensic Readiness (CDFR).
Related papers
- Disclosure Audits for LLM Agents [44.27620230177312]
Large Language Model agents have begun to appear as personal assistants, customer service bots, and clinical aides.<n>This study proposes an auditing framework for conversational privacy that quantifies and audits these risks.
arXiv Detail & Related papers (2025-06-11T20:47:37Z) - A Systematic Literature Review on Continuous Integration and Deployment (CI/CD) for Secure Cloud Computing [0.6117371161379209]
Continuous Software Engineering is essential for software development and deployment.<n>We reviewed 66 papers, summarising tools, approaches, and challenges related to the security of CI/CD in the cloud.<n>Challenges such as image manipulation, unauthorised access, and weak authentication were highlighted.
arXiv Detail & Related papers (2025-06-09T04:21:29Z) - Opportunistic Collaborative Planning with Large Vision Model Guided Control and Joint Query-Service Optimization [74.92515821144484]
Navigating autonomous vehicles in open scenarios is a challenge due to the difficulties in handling unseen objects.<n>Existing solutions either rely on small models that struggle with generalization or large models that are resource-intensive.<n>This paper proposes opportunistic collaborative planning (OCP), which seamlessly integrates efficient local models with powerful cloud models.
arXiv Detail & Related papers (2025-04-25T04:07:21Z) - Deep Learning Approaches for Anti-Money Laundering on Mobile Transactions: Review, Framework, and Directions [51.43521977132062]
Money laundering is a financial crime that obscures the origin of illicit funds.<n>The proliferation of mobile payment platforms and smart IoT devices has significantly complicated anti-money laundering investigations.<n>This paper conducts a comprehensive review of deep learning solutions and the challenges associated with their use in AML.
arXiv Detail & Related papers (2025-03-13T05:19:44Z) - Secure Outsourced Decryption for FHE-based Privacy-preserving Cloud Computing [3.125865379632205]
Homomorphic encryption (HE) is one solution for safeguarding data privacy, enabling encrypted data to be processed securely in the cloud.
We propose an outsourced decryption protocol for the prevailing RLWE-based fully homomorphic encryption schemes.
Our experiments demonstrate that the proposed protocol achieves up to a $67%$ acceleration in the client's local decryption, accompanied by a $50%$ reduction in space usage.
arXiv Detail & Related papers (2024-06-28T14:51:36Z) - Enc2DB: A Hybrid and Adaptive Encrypted Query Processing Framework [47.11111145443189]
We introduce Enc2DB, a novel secure database system following a hybrid strategy on and openGauss.
We present a micro-benchmarking test and self-adaptive mode switch strategy that can choose the best execution path (cryptography or TEE) to answer a given query.
We also design and implement a ciphertext index compatible with native cost model and querys to accelerate query processing.
arXiv Detail & Related papers (2024-04-10T08:11:12Z) - Cloud Security Assurance: Strategies for Encryption in Digital Forensic Readiness [0.0]
This paper explores strategies for enhancing cloud security through encryption and digital forensic readiness.
Various encryption techniques and key management practices are discussed, along with their implications for data privacy and regulatory compliance.
arXiv Detail & Related papers (2024-03-04T15:39:42Z) - Exploring the Potential of Large Language Models for Improving Digital Forensic Investigation Efficiency [0.1433758865948252]
The ever-increasing workload of digital forensic labs raises concerns about law enforcement's ability to conduct both cyber-related and non-cyber-related investigations promptly.<n>This article explores the potential and usefulness of integrating Large Language Models into digital forensic investigations to address challenges such as bias, explainability, censorship, resource-intensive infrastructure, and ethical and legal considerations.
arXiv Detail & Related papers (2024-02-29T17:13:44Z) - Reflection of Federal Data Protection Standards on Cloud Governance [0.0]
This research focuses on cloud governance by harmoniously combining multiple data security measures with legislative authority.
We present legal aspects aimed at the prevention of data breaches, as well as the technical requirements regarding the implementation of data protection mechanisms.
arXiv Detail & Related papers (2024-02-26T17:04:01Z) - Digital Twin-Enhanced Deep Reinforcement Learning for Resource
Management in Networks Slicing [46.65030115953947]
We propose a framework consisting of a digital twin and reinforcement learning agents.
Specifically, we propose to use the historical data and the neural networks to build a digital twin model to simulate the state variation law of the real environment.
We also extend the framework to offline reinforcement learning, where solutions can be used to obtain intelligent decisions based solely on historical data.
arXiv Detail & Related papers (2023-11-28T15:25:14Z) - DualCF: Efficient Model Extraction Attack from Counterfactual
Explanations [57.46134660974256]
Cloud service providers have launched Machine-Learning-as-a-Service platforms to allow users to access large-scale cloudbased models via APIs.
Such extra information inevitably causes the cloud models to be more vulnerable to extraction attacks.
We propose a novel simple yet efficient querying strategy to greatly enhance the querying efficiency to steal a classification model.
arXiv Detail & Related papers (2022-05-13T08:24:43Z) - Getting Critical: Making Sense of the EU Cybersecurity Framework for
Cloud Providers [0.799536002595393]
We examine whether all cloud services should be treated as critical infrastructure.
We look at the proposed revision of the General Data Protection Regulation and the Network Information Systems Directive.
We conclude that since cloud providers are subject to both divergent and divergent regulatory approaches can lead to unintended outcomes and high compliance costs.
arXiv Detail & Related papers (2022-03-09T16:59:36Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z) - A Privacy-Preserving Distributed Architecture for
Deep-Learning-as-a-Service [68.84245063902908]
This paper introduces a novel distributed architecture for deep-learning-as-a-service.
It is able to preserve the user sensitive data while providing Cloud-based machine and deep learning services.
arXiv Detail & Related papers (2020-03-30T15:12:03Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.