A Digital Forensic Model for Introspection of Virtual Machines in Cloud Computing

被引:0
|
作者
Alluri, B. K. S. P. Kumar Raju [1 ]
Geethakumari, G. [1 ]
机构
[1] BITS Pilani, Hyderabad Campus, Hyderabad, Andhra Pradesh, India
关键词
Cloud Computing; Forensics; Introspection; Cloud Forensics;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Performing digital forensics in cloud can add a new dimension to the process of building trust in cloud. But the very characteristics of cloud such as lack of transparency, virtualization, legal issues etc., pose challenges to cloud forensics. Whether it is traditional digital forensics or cloud forensics, collecting comprehensive data for analysis is a major challenge in investigation. Data collection in highly virtualized environments like cloud is very complex. The ultimate goal of evidence collection and analysis is to prove to the court of law that they are forensically sound. We can use introspection techniques since these will not contaminate the state of the source of evidence while collecting the required data. We identified two major drawbacks in the introspection process. First, a proper triggering condition will only make the investigator to get the needed data. Failing to devise proper triggers will lead to loss of data in the cloud multi-tenant environment. Next, during the data collection the corresponding virtual machine (VM) has to be paused for a while, leading to performance degradation. In this paper, we emphasize mainly on the first issue and propose a framework for the introspection of virtual machines to address the same.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Forensic Virtual Machines: Dynamic defence in the Cloud via Introspection
    Shaw, Adrian L.
    Bordbar, Behzad
    Saxon, John
    Harrison, Keith
    Dalton, Chris I.
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 303 - 310
  • [2] A Digital Forensic Process Model for Cloud Computing
    De, Sanghamitra
    Barik, Mridul Sankar
    Banerjee, Indrajit
    2020 IEEE CALCUTTA CONFERENCE (CALCON), 2020, : 106 - 110
  • [3] An efficient digital forensic model for cybercrimes investigation in cloud computing
    Hemdan, Ezz El-Din
    Manjaiah, D. H.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (09) : 14255 - 14282
  • [4] An efficient digital forensic model for cybercrimes investigation in cloud computing
    Ezz El-Din Hemdan
    D.H Manjaiah
    Multimedia Tools and Applications, 2021, 80 : 14255 - 14282
  • [5] Cloud Computing: Digital Forensic Solutions
    Morioka, Emi
    Sharbaf, Mehrdad S.
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 589 - 594
  • [6] Models for the Forensic Monitoring of Cloud Virtual Machines
    Ras, Dirk
    Venter, Hein
    PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 290 - 299
  • [7] Virtual Firewalling For Migrating Virtual Machines In Cloud Computing
    Anwar, Mahwish
    PROCEEDINGS OF THE 2013 5TH INTERNATIONAL CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES (ICICT 2013), 2013,
  • [8] Model Predictive Control for the Placement of Virtual Machines in Cloud Computing Applications
    Gaggero, Mauro
    Caviglione, Luca
    2016 AMERICAN CONTROL CONFERENCE (ACC), 2016, : 1987 - 1992
  • [9] Trust based trustworthiness attestation model of virtual machines for cloud computing
    Institute of Command Information System, PLA University of Science and Technology, Nanjing
    210007, China
    Dongnan Daxue Xuebao, 1 (31-35):
  • [10] Efficient Distribution of Virtual Machines for Cloud Computing
    Schmidt, Matthias
    Fallenbeck, Niels
    Smith, Matthew
    Freisleben, Bernd
    PROCEEDINGS OF THE 18TH EUROMICRO CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING, 2010, : 567 - 574