yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
Cloud Expo & Virtualization 2009 East
Smarter Business Solutions Through Dynamic Infrastructure
Smarter Insights: How the CIO Becomes a Hero Again
Windows Azure
Why VDI?
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun's Incubation Platform: Helping Startups Serve the Enterprise
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Fighting Crime on the Invisible Cloud | @CloudExpo #Cloud
The tough road ahead for fighting crime on the cloud

Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists.

The cloud brings unique advantages to individual and business users alike and this explains the exponential adoption rate that cloud has seen in the past decade. There are also numerous security challenges with the cloud especially in the areas of privacy and data theft that has concerned stakeholders for a long time. However, with sophisticated encryption technologies, the instances of cloud data getting stolen is only going to get fewer in future.

But there is another aspect to cloud that has not been discussed as vocally as the security issues have been – crime. Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists. One of the biggest examples to this is Tor. The Onion Router encrypts web requests from users and allows them to be routed through a network of Tor servers located across the web in such a way that it completely obfuscates the identity of the original request. Although it was originally developed by the US Navy, the browser is now a gateway to the deep web – an underground internet that is completely hidden from search engines and conventional internet users.

A research by the Trend Micro Deep Web Analyzer showed up some interesting numbers. According to the research, the listed price for US Citizenship on a deep web site selling fake passports was $5900. Stolen Paypal accounts with about $500-$700 balance in them was around $250 while the price for assassinating a celebrity or politician was listed at $180,000. These listing and transactions are not too different from routine cloud transactions that regular consumers like us engage in. However, these transactions leave no trail on the cloud making it attractive for criminals.

Considering the implications, governments are investing more into improving electronic forensics to fight crime on the cloud. While criminals operating over platforms like eBay, Facebook or Paypal are regularly apprehended thanks to compliance from the platform owners, this can prove to be difficult on the dark web where criminals host their own servers. Cloud data aggregation for forensics has proven to be difficult so far because of the problems with multi-tenant hosting, synchronization and data segregation.

However, investigators have started identifying loopholes in the system that could help tackle crime on the invisible cloud. The drawbacks of Tor has already been well established and investigators in the FBI have already used a combination of malware and interception techniques to bust open the IP addresses of criminals using Tor. Bitcoin forensics too has been picking up which is making it possible to reconstruct transfers and potentially bust illegal transactions.

With the amount of resources required to bust these hidden cloud transactions, it is definitely a tough road ahead for investigators. But the good news is that investments in the area have picked up and so will the tools necessary to fight crime. Cloud has changed the way corporate entities do business and so has it changed the operations of criminals and it will need innovations to fight this new form of crime that is only going to get bigger in future.

About Harry Trott
Harry Trott is an IT consultant from Perth, WA. He is currently working on a long term project in Bangalore, India. Harry has over 7 years of work experience on cloud and networking based projects. He is also working on a SaaS based startup which is currently in stealth mode.

Latest Cloud Developer Stories
"Storpool does only block-level storage so we do one thing extremely well. The growth in data is what drives the move to software-defined technologies in general and software-defined storage," explained Boyan Ivanov, CEO and co-founder at StorPool, in this interview at...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected ...
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configura...
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - ...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers