Forensic Challenges in Mobile Cloud Computing

被引:0
作者
Khan, Suleman [1 ,2 ]
Ahmad, Ejaz [1 ,2 ]
Shiraz, Muhammad [1 ,2 ]
Gani, Abdullah [1 ,2 ]
Wahab, Ainuddin Wahid Abdul [1 ,2 ]
Bagiwa, Mustapha Aminu [2 ]
机构
[1] Univ Malaya, Ctr Mobile Cloud Comp Res C4MCCR, Kuala Lumpur, Malaysia
[2] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
来源
2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT) | 2014年
关键词
component; Forensic; Investigation; Mobile cloud computing;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Mobile cloud computing (MCC) is fast becoming one of the most essential research topics for distributed resource networks. Users can easily access cloud while offloading their mobile applications from anywhere anytime. Being easy to access, intruder attacks mobile networks to acquire credential from mobile applications inside and outside the cloud computing. To investigate intruder's attacks, digital investigator has to identify the root cause of the attack. However, investigating MCC infrastructure is difficult due to its characteristics of virtualization, dispersion of data, multi tenancy, interoperability, and mobility. In this paper, we present an overview of MCC and digital forensics, focusing on its key aspects and significant forensic challenges faced by digital investigators in MCC. The purpose of this paper is to provide a comprehensive understanding about forensic research challenges and re-direct researchers towards new research areas.
引用
收藏
页码:343 / 347
页数:5
相关论文
共 31 条
  • [1] Alhamad M., 2010, 2010 4th IEEE International Conference on Digital Ecosystems and Technologies (DEST 2010), P606, DOI 10.1109/DEST.2010.5610586
  • [2] A Distributed Snapshot Framework for Digital Forensics Evidence Extraction and Event Reconstruction From Cloud Environment
    Almulla, Sameera
    Iraqi, Youssef
    Jones, Andrew
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 1, 2013, : 699 - 704
  • [3] Amin MA, 2013, IEEE GCC CONF EXHIB, P240, DOI 10.1109/IEEEGCC.2013.6705783
  • [4] [Anonymous], COMPUTING RES REPOSI
  • [5] [Anonymous], 2010, P ACM MOBISYS, DOI [10.1145/1814433.1814441, DOI 10.1145/1814433.1814441]
  • [6] [Anonymous], 2006, GUIDE INTEGRATING FO, DOI DOI 10.6028/NIST.SP.800-86
  • [7] [Anonymous], 2013, P 8 ACM SIGSAC S INF
  • [8] [Anonymous], 2011, Advances in Digital Forensics, DOI DOI 10.1007/978-3-642-24212-0_3
  • [9] [Anonymous], P INF SEC S AFR JOH
  • [10] Dinh H. T., 2011, WIRELESS COMMUNICATI