Digital Forensic Approach for Investigation of Cybercrimes in Private Cloud Environment

被引:3
|
作者
Hemdan, Ezz El-Din [1 ]
Manjaiah, D. H. [1 ]
机构
[1] Mangalore Univ, Dept Comp Sci, Mangalore, India
来源
RECENT FINDINGS IN INTELLIGENT COMPUTING TECHNIQUES, VOL 1 | 2019年 / 707卷
关键词
Cloud computing; Private cloud; Digital forensics and cybercrimes;
D O I
10.1007/978-981-10-8639-7_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing is a revolutionary technology that provide computing and storage resources as a service accessible via network connections. Cloud computing has two foremost models which are services and deployment. One of the significant deployment models is a private cloud which is used by large organizations for building a corporate cloud inside their internal departments to provide computing services such as Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS). They adopted the internal private cloud to reduce cost and save time. In last decades, number of severe attacks and threats against the private cloud is increasing which make it facing complex challenges in the security province so that a forensic approach for cybercrime investigation should be systematized. Therefore, this paper presents a digital forensic approach for investigation of cybercrimes in a private cloud environment. Here, focus on using virtualization technology solutions from VMware for building experimental environment. From the experiment analysis, the proposed approach can help digital investigators and practitioners in acquisition and collection of digital evidence from the private cloud infrastructures especially virtual machine which is considered the core element of virtualized cloud systems.
引用
收藏
页码:25 / 33
页数:9
相关论文
共 50 条
  • [31] Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud
    Imran, Asif
    Aljawarneh, Shadi
    Sakib, Kazi
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2016, 22 (04) : 494 - 520
  • [32] Overview of the Forensic Investigation of Cloud Services
    Farina, Jason
    Scanlon, Mark
    Nhien-An Le-Khac
    Kechadi, M-Tahar
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 556 - 565
  • [33] A Cloud Forensic Strategy for Investigation of Cybercrime
    Hemdan, Ezz El-Din
    Manjaiah, D. H.
    IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGICAL TRENDS IN COMPUTING, COMMUNICATIONS AND ELECTRICAL ENGINEERING (ICETT), 2016,
  • [34] Logic-based approach for digital forensic investigation in communication Networks
    Rekhis, Slim
    Boudriga, Noureddine
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 376 - 396
  • [35] On the Privacy of Private Browsing - A Forensic Approach
    Satvat, Kiavash
    Forshaw, Matthew
    Hao, Feng
    Toreini, Ehsan
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 380 - 389
  • [36] On the privacy of private browsing - A forensic approach
    Satvat, Kiavash
    Forshaw, Matthew
    Hao, Feng
    Toreini, Ehsan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 88 - 100
  • [37] Migrating a Digital Library to a Private Cloud
    Wu, Jian
    Teregowda, Pradeep
    Williams, Kyle
    Khabsa, Madian
    Jordan, Douglas
    Treece, Eric
    Wu, Zhaohui
    Giles, C. Lee
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 97 - 106
  • [38] Research on Digital Forensic Readiness Design in a Cloud Computing-Based Smart Work Environment
    Park, Sangho
    Kim, Yanghoon
    Park, Gwangmin
    Na, Onechul
    Chang, Hangbae
    SUSTAINABILITY, 2018, 10 (04)
  • [39] CFRF: Cloud Forensic Readiness Framework - A Dependable Framework for Forensic Readiness in Cloud Computing Environment
    Bhatia, Sugandh
    Malhotra, Jyoteesh
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 765 - 775
  • [40] Forensicloud: An architecture for digital forensic analysis in the cloud
    Miller, Cody
    Glendowne, Dae
    Dampier, David
    Blaylock, Kendallkblaylock@cse.msstate.edu
    Journal of Cyber Security and Mobility, 2014, 3 (03): : 231 - 262