Investigating cybercrime in a cloud-computing environment