ICFF: a cloud forensics framework under the IaaS model

被引:0
作者
机构
[1] National Engineering Research Center of Fundamental Software, Institute of Software, Chinese Academy of Sciences
[2] Graduate University of Chinese Academy of Sciences
来源
Xie, Y.-L. | 1600年 / Editorial Board of Journal on Communications卷 / 34期
关键词
Cloud computing; Cloud forensics; Digital forensics; IaaS model;
D O I
10.3969/j.issn.1000-436x.2013.05.023
中图分类号
学科分类号
摘要
Technical challenges of cloud forensics was summarized and a forensics framework under an infrastructure as a service(IaaS) cloud model called ICFF was proposed. Then, this framework on the open source IaaS cloud platform Eucalyptus was implemented. Finally, a test case to demonstrate the effectiveness of ICFF was designed. Experiments show that the framework can obtain evidence data in cloud platform effectively and efficiently.
引用
收藏
页码:200 / 206
页数:6
相关论文
共 18 条
[1]  
Simson L.G., Digital forensics research: the next 10 years, Digital Investigation, 7, pp. 64-73, (2010)
[2]  
Wolthusen S.D., Overcast: forensic discovery in cloud environments, The 5th International Conference on IT Security Incident Management and IT Forensics, pp. 3-9, (2009)
[3]  
Keyun R., Joe C., Tahar K., Et al., Cloud forensics: an overview, 7th IFIP Conference on Digital Forensics, pp. 35-46, (2011)
[4]  
Biggs S., Vidalis S., Cloud computing: the impact on digital forensic investigations, International Conference for Internet Technology and Secured Transactions, pp. 1-6, (2009)
[5]  
Birk D., Wegener C., Technical issues of forensic investigations in cloud computing environments, IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 1-10, (2011)
[6]  
Eucalyptus
[7]  
Nurmi D., Wolski R., Grzegorczyk C., Et al., The eucalyptus open-source cloud-computing system, IEEE/ACM International Symposium on Cluster Computing and the Grid, pp. 124-131, (2009)
[8]  
Keyun R., Ibrahim B., Joe C., Et al., Survey on cloud forensics and critical criteria for cloud forensic capability: a preliminary analysis, Proceedings of the ADFSL Conference on Digital Forensics, Security and Law, pp. 105-121, (2011)
[9]  
Reilly D., Wren C., Berry T., Cloud computing: forensic challenges for law enforcement, International Conference for Internet Technology and Secured Transactions, pp. 1-7, (2010)
[10]  
Elie B., Ivan F., Matthieu M., Et al., Doing forensics in the cloud age OWADE: beyond files recovery forensic, Black Hat, pp. 1-23, (2011)