yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
Cloud Expo & Virtualization 2009 East
Smarter Business Solutions Through Dynamic Infrastructure
Smarter Insights: How the CIO Becomes a Hero Again
Windows Azure
Why VDI?
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun's Incubation Platform: Helping Startups Serve the Enterprise
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Fighting Crime on the Invisible Cloud | @CloudExpo #Cloud
The tough road ahead for fighting crime on the cloud

Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists.

The cloud brings unique advantages to individual and business users alike and this explains the exponential adoption rate that cloud has seen in the past decade. There are also numerous security challenges with the cloud especially in the areas of privacy and data theft that has concerned stakeholders for a long time. However, with sophisticated encryption technologies, the instances of cloud data getting stolen is only going to get fewer in future.

But there is another aspect to cloud that has not been discussed as vocally as the security issues have been – crime. Cloud servers bring with them distributed hosting and the ability to anonymize identities and that has enabled cloud becoming a breeding ground for criminals and even terrorists. One of the biggest examples to this is Tor. The Onion Router encrypts web requests from users and allows them to be routed through a network of Tor servers located across the web in such a way that it completely obfuscates the identity of the original request. Although it was originally developed by the US Navy, the browser is now a gateway to the deep web – an underground internet that is completely hidden from search engines and conventional internet users.

A research by the Trend Micro Deep Web Analyzer showed up some interesting numbers. According to the research, the listed price for US Citizenship on a deep web site selling fake passports was $5900. Stolen Paypal accounts with about $500-$700 balance in them was around $250 while the price for assassinating a celebrity or politician was listed at $180,000. These listing and transactions are not too different from routine cloud transactions that regular consumers like us engage in. However, these transactions leave no trail on the cloud making it attractive for criminals.

Considering the implications, governments are investing more into improving electronic forensics to fight crime on the cloud. While criminals operating over platforms like eBay, Facebook or Paypal are regularly apprehended thanks to compliance from the platform owners, this can prove to be difficult on the dark web where criminals host their own servers. Cloud data aggregation for forensics has proven to be difficult so far because of the problems with multi-tenant hosting, synchronization and data segregation.

However, investigators have started identifying loopholes in the system that could help tackle crime on the invisible cloud. The drawbacks of Tor has already been well established and investigators in the FBI have already used a combination of malware and interception techniques to bust open the IP addresses of criminals using Tor. Bitcoin forensics too has been picking up which is making it possible to reconstruct transfers and potentially bust illegal transactions.

With the amount of resources required to bust these hidden cloud transactions, it is definitely a tough road ahead for investigators. But the good news is that investments in the area have picked up and so will the tools necessary to fight crime. Cloud has changed the way corporate entities do business and so has it changed the operations of criminals and it will need innovations to fight this new form of crime that is only going to get bigger in future.

About Harry Trott
Harry Trott is an IT consultant from Perth, WA. He is currently working on a long term project in Bangalore, India. Harry has over 7 years of work experience on cloud and networking based projects. He is also working on a SaaS based startup which is currently in stealth mode.

Latest Cloud Developer Stories
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions n...
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructur...
When building large, cloud-based applications that operate at a high scale, it's important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. "Fly two mis...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performa...
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers