Proposed Computer Forensic Approach for Cloud Computing Environment

被引:0
作者
Ahmed, Mubarak [1 ,2 ]
Samy, Ganthan Narayana [1 ,2 ]
Maarop, Nurazean [1 ,2 ]
Shanmugam, Bharanidharan [3 ]
Magalingam, Pritheega [1 ,2 ]
Ahmad, Rabiah [4 ]
机构
[1] Adv Informat Sch, Level 5, Menara Razak, Malaysia
[2] Univ Teknol Malaysia, Kuala Lumpur 54100, Malaysia
[3] Charles Darwin Univ, Ellengowan Dr,Casuarina Campus, Darwin, NT, Australia
[4] Univ Tech Malaysia Melaka UTeM, Fac Informat Technol Commun, Melaka, Malaysia
关键词
Computer Forensic; Cloud Computing; Software as a Service (laaS); Network; Information Security;
D O I
10.1166/asl.2016.8011
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducing a new approach in identifying computer forensic attacks using Infrastructure as a Service (IaaS) in a cloud computing environment. First will identify and classify the different types of attacks on cloud infrastructure. Next, based on the attacks we are going to suggest an appropriate approach that can be utilized to collect as much data possible to perform a detailed investing of the incidents or attacks. Furthermore, the proposed approach will be tested in a virtual environment in order to check its effectiveness. Finally, refinement will be performed based on the results obtained and will be bench marked against the existing computer forensic approaches. Thus, this study contributes to better provide many data sources that can be used by the investigators to conduct forensics investigation in the infrastructure layer of the cloud computing. The findings will benefit the organizations which deploy private cloud services and infrastructure services which include virtual machines. Therefore, this paper discusses in detail the proposed computer forensic approach.
引用
收藏
页码:3137 / 3141
页数:5
相关论文
共 12 条
[1]  
Alsubaih A., 2013, IEEE, V487
[2]  
Bruening P., 2009, PRIVACY DATA PROTECT, P1
[3]  
Hirwani M., 2012, P INT C SEC MAN, V1
[4]  
Mell R, 2011, NIST DEFINITION CLOU, P800
[5]  
Nagesh A., 2007, THESIS
[6]   Logging for Cloud Computing Forensic Systems [J].
Patrascu, A. ;
Patriciu, V. V. .
INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2015, 10 (02) :222-229
[7]  
Pilli EmmanuelS., 2010, International Journal of Computer Applications, V1, P1, DOI [10.5120/251-408, DOI 10.5120/251-408]
[8]  
Saxena A., 2012, INT J FORENSIC COMPU, V2, P64
[9]  
Sen J., 2013, ARCHIT PROTOC SECURE, V1
[10]  
Shanmugasundaram K, 2003, LECT NOTES COMPUT SC, V2776, P1