Digital Forensics for Infrastructure-As-A-Service Cloud Computing
Total Page:16
File Type:pdf, Size:1020Kb
APPROVAL SHEET Title of Dissertation: Digital Forensics for Infrastructure-as-a-Service Cloud Computing Name of Candidate: Josiah Alexander Bradford Spoor Dykstra Doctor of Philosophy, 2013 Dissertation and Abstract Approved: Alan T. Sherman Associate Professor Department of Computer Science and Electrical Engineering Date Approved: CURRICULUM VITAE Name: Josiah Alexander Bradford Spoor Dykstra. Degree and date to be conferred: Doctor of Philosophy, May 2013. Secondary Education: Heelan High School, Sioux City, IA, 1998. Collegiate institutions attended: Hope College, B.S., computer science, 2002. Hope College, B.A., music, 2002. Iowa State University, M.S., information assurance, 2004. Major: computer science. Professional publications: 1. Dykstra, J. and A.T. Sherman, “Design and Implementation of FROST: Digital Forensic Tools for the OpenStack Cloud Computing Platform,” DFRWS Annual Digital Forensics Research Conference, August, 2013, Monterey, CA (paper accepted). 2. Dykstra, J. “Search Warrant Language for Cloud Computing,” In Proceedings of the Annual Meeting of the American Academy of Forensic Sciences, Vol. 19, February, 2013, Washington, DC. 3. Dykstra, J, “Seizing Electronic Evidence from Cloud Computing Environments,” Cybercrime and Cloud Forensics: Applications for Investigation Processes. Ed. Keyun Ruan. Hershey: IGI Global, 2013. 156-85. 4. Dykstra, J. and D. Riehl, “Forensic Collection of Electronic Evidence from Infrastructure-As-A-Service Cloud Computing,” In Richmond Journal of Law and Technology, Vol. 19, Issue 1, 2012. 5. Dykstra, J. and A.T. Sherman, “Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing: Exploring and Evaluating Tools, Trust, and Technique,” In Proceedings of the DFRWS Annual Digital Forensics Research Conference, August, 2012, Washington, DC., S90-S98. 6. Dykstra, J. “Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies,” In Proceedings of the Annual Meeting of the American Academy of Forensic Sciences, Vol. 18, February, 2012, Atlanta, GA. 7. Dykstra, J. and A.T. Sherman, “Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies,” In Proceedings of the 2011 ADSFL Conference on Digital Forensics, Security, and Law, 2011, Richmond, VA, 191-206. 8. Dykstra, J. and A.T. Sherman, “Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies,” In Journal of Network Forensics , Vol. 3, Issue 1, 2011, 19-31. 9. Dykstra, J., “A framework for network covert channel detection.” Thesis (M.S.)–Iowa State University, 2004. Professional positions held: United States Department of Defense. Global Network Exploitation and Vulnerability Analyst. (2004–Present). Iowa State University. Research Assistant. (2002–2004). ABSTRACT Title of Dissertation: Digital Forensics for Infrastructure-as-Service Cloud Computing Josiah Alexander Bradford Spoor Dykstra, Doctor of Philosophy, 2013 Dissertation directed by: Alan T. Sherman, Associate Professor Department of Computer Science and Electrical Engineering We identify important issues in the application of digital forensics to Infrastructure- as-a-Service cloud computing and develop new practical forensic tools and techniques to facilitate forensic exams of the cloud. When investigating suspected cases involving cloud computing, forensic examiners have been poorly equipped to deal with the technical and legal challenges. Because data in the cloud are remote, distributed, and elastic, these challenges include understanding the cloud environment, acquiring and analyzing data remotely, and applying the law to a new domain. Today digital forensics for cloud computing is challenging at best, but can be performed in a manner consistent with federal law using the tools and techniques we developed. The first problem is understanding how and why criminal and civil actions in and against cloud computing are unique and difficult to prosecute. We analyze a digital forensic inves- tigation of crime in the cloud, and present two hypothetical case studies that illustrate the unique challenges of acquisition, chain of custody, trust, and forensic integrity. Understand- ing these issues introduces legal challenges which are also important for federal, state, and local law enforcement who will soon be called upon to conduct cloud investigations. The second problem is the lack of practical technical tools to conduct cloud forensics. We examine the capabilities for forensics today, evaluate the use of existing tools including EnCase and FTK, and discuss why these tools are incapable of trustworthy cloud acquisition. We design consumer-driven forensic capabilities for OpenStack, including new features for acquiring trustworthy firewall logs, API logs, and disk images. The third problem is a deficit of legal instruments for seizing cloud-based electronically- stored information. We analyze the application of existing policies and laws to the new domain of cloud computing by analyzing case law and legal opinions about digital evidence discovery, and suggest modifications that would enhance cloud the prosecution of cloud- based crimes. We offer guidance about how to author a search warrant for cloud data, and what pertinent data to request. This dissertation enhances our understanding of technical, trust, and legal issues needed to investigate cloud-based crimes and offers new tools and techniques to facilitate such investigations. Digital Forensics for Infrastructure-as-a-Service Cloud Computing by Josiah Alexander Bradford Spoor Dykstra Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, Baltimore County in partial fulfillment of the requirements for the degree of Doctor of Philosophy 2013 c Copyright Josiah Alexander Bradford Spoor Dykstra 2013 To Alicia ii ACKNOWLEDGMENTS Alan Sherman has been a helpful advisor, knowledgeable guide, and ardent supporter. He never failed to encourage me to strive for perfection in my writing and research. My work is better because of him. Thank you to my distinguished committee for guidance and wisdom—Dr. Forno; Dr. Nicholas; Mr. Flynn; Dr. Garfinkel. Thanks also to the UMBC Cyber Defense Lab for listening to my presentations and giving thoughtful feedback. I am particularly indebted to Timothy Leschke, who shared many successes and frustrations with me along the way. My academic work was made entirely possible through the support and encouragement of the Department of Defense. I appreciate their dedication to continuing education. Thanks especially to supervisors and colleagues who were flexible in allowing me to take the time to work on my research. Thanks to many friends, colleagues, teachers, and mentors that have reviewed papers and offered helpful advice, especially Matt Georgy, Eoghan Casey, and Mark Rasch. Damien Riehl was a brilliant co-author on Chapter6 and advisor on legal issues. More than anyone else, my deepest gratitude and love goes to my wife, Alicia, who encouraged and supported me through this process. She endured many hours of me at the computer and technical conversations over dinner. iii Contents 1 Introduction1 1.1 Motivation...................................2 1.2 Thesis Statement...............................4 1.3 Contributions of this Dissertation.......................4 1.3.1 Identification of Cloud-Specific Forensic Issues Using Two Hypo- thetical Case Studies.........................5 1.3.2 Evaluation of Existing Tools for Cloud Forensics and Analysis of Trust in Cloud Evidence.......................5 1.3.3 Development of Three Forensic Tools for OpenStack........6 1.3.4 Analysis of Legal Challenges in Cloud Forensics and a Sample Search Warrant............................7 1.4 Outline....................................8 2 Background and Related Work9 2.1 Cloud Computing...............................9 2.1.1 Background..............................9 2.1.2 Related Work............................. 12 2.2 Digital Forensics............................... 12 iv 2.2.1 Background.............................. 12 2.2.2 Related Work............................. 15 2.3 Law...................................... 19 2.3.1 Background.............................. 19 2.3.2 Related Work............................. 21 2.4 Cryptography................................. 22 I Issues and Solutions for Digital Forensics of Cloud Computing 23 3 Two Hypothetical Case Studies 24 3.1 Existing Forensic Frameworks........................ 24 3.2 Case Studies.................................. 25 3.2.1 Case Study 1............................. 26 3.2.2 Case Study 2............................. 32 3.3 Analysis.................................... 35 3.4 Conclusions.................................. 38 4 Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Comput- ing 39 4.1 Previous and Related Work.......................... 41 4.2 The Cloud Forensic Examination....................... 42 4.2.1 Layers of Trust............................ 42 4.2.2 Choices in Cloud Forensics..................... 45 4.3 Cloud Forensics Using Today’s Tools.................... 47 4.3.1 Motivation.............................. 47 4.3.2 Extracting Data From Amazon EC2................. 48 v 4.3.3 Methods............................... 49 4.3.4 Results................................ 51 4.4 Discussion................................... 54 4.5 Alternatives for Forensic Acquisition..................... 56 4.5.1 Rooting Trust with TPMs...................... 56 4.5.2 Collection from the Management Plane............... 57 4.5.3 Forensic Support as a Service...................