Models for the Forensic Monitoring of Cloud Virtual Machines

被引:0
|
作者
Ras, Dirk [1 ]
Venter, Hein [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, Informat & Comp Secur Architectures Res Grp, ZA-0002 Pretoria, South Africa
来源
PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014) | 2014年
关键词
digital forensics; computer forensics; hypervisor; cloud computing; forensic monitoring;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the prevalence of cloud computing and the "as a Service" delivery paradigm, the need has arisen for the ability to conduct an effective digital forensic investigation on these systems. Linked to this is the concept of forensic readiness, which when implemented correctly, makes it possible to conduct a credible forensic investigation on such large scale systems. This paper proposes five models that will enable forensic monitoring, that with their application will facilitate forensic readiness. These models are designed in a manner that data from guest virtual machines can be captured and stored should the need for forensic investigations arise. The cloud hypervisor plays a pivotal role hosting of the guest virtual machines and thus its native abilities are expanded on to make it possible to capture, catalogue and store information of the guest virtual machines. With the research already done in the field of forensic readiness of cloud computing systems, these models can serve as a possible implementation solution for further research into the field. Five models were chosen as it is the number of places where a forensic monitor can be implemented by a cloud service provider on standard cloud architecture. The proposed models can be implemented on the guest virtual machine operating system, the cloud hypervisor, the communication layer between the cloud operating system and hypervisor, and as a single or multi-tenant forensic virtual machine. Because of the cost associated with implementing new hardware, the proposed models are all software based and can be implemented with existing cloud infrastructures without the need to change hardware configurations. For the purposes of this paper a forensic investigation is of a corporate nature where fraud or disaster recovery is the primary motivation. With the case of government security agency involvement a different motivation would apply which is not relevant to this paper.
引用
收藏
页码:290 / 299
页数:10
相关论文
共 50 条
  • [1] A Digital Forensic Model for Introspection of Virtual Machines in Cloud Computing
    Alluri, B. K. S. P. Kumar Raju
    Geethakumari, G.
    2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2015,
  • [2] Forensic Virtual Machines: Dynamic defence in the Cloud via Introspection
    Shaw, Adrian L.
    Bordbar, Behzad
    Saxon, John
    Harrison, Keith
    Dalton, Chris I.
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 303 - 310
  • [3] Towards Multi-Tenant and Interoperable Monitoring of Virtual Machines in Cloud
    Tovarnak, Daniel
    Pitner, Tomas
    14TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2012), 2012, : 436 - 442
  • [4] CloudMonatt: an Architecture for Security Health Monitoring and Attestation of Virtual Machines in Cloud Computing
    Zhang, Tianwei
    Lee, Ruby B.
    2015 ACM/IEEE 42ND ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA), 2015, : 362 - 374
  • [5] Forensic Analysis of Cloud Virtual Environments
    Sedighi, Art
    Jacobson, Doug
    2019 22ND IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (IEEE CSE 2019) AND 17TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (IEEE EUC 2019), 2019, : 323 - 329
  • [6] Enhanced Active Monitoring Load Balancing Algorithm for Virtual Machines in Cloud Computing
    Garg, Shikha
    Gupta, D. V.
    Dwivedi, Rakesh Kumar
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 339 - 344
  • [7] NVMe Virtualization for Cloud Virtual Machines
    Luo, Lixiang
    Chung, I-Hsin
    Seelam, Seetharami
    Chen, Ming-Hung
    Soh, Yun Joon
    PROCEEDINGS OF THE 2022 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING (ICPE '22), 2022, : 37 - 46
  • [8] Capacity Quantification of Virtual Machines in Cloud
    Rajan, R. Arokia Paul
    Francis, F. Sagayaraj
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 363 - 366
  • [9] Virtual Firewalling For Migrating Virtual Machines In Cloud Computing
    Anwar, Mahwish
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [10] Improving Scalability of Cloud Monitoring Through PCA-Based Clustering of Virtual Machines
    Claudia Canali
    Riccardo Lancellotti
    JournalofComputerScience&Technology, 2014, 29 (01) : 38 - 52