Logging System for Cloud Computing Forensic Environments

被引:0
|
作者
Pitrascu, Alecsandru [1 ]
Patriciu, Victor-Valeriu [1 ]
机构
[1] Mil Tech Acad, Dept Comp Sci, Bucharest, Romania
来源
关键词
cloud computing; data forensics; logging framework; distributed computing; binary cliff;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing represents a rather new technology and a different paradigm in the field of distributed computing that involve more and more researchers. We can see in this context the need to know exactly where, when and how a piece of data is processed or stored. Compared with classic digital forensic, the field of cloud forensic poses a lot of difficulties since data is not stored on a single storage unit and furthermore it involves the use of virtualization technologies. In this paper we will present in detail a new and novel way of monitoring activity in cloud environments and datacenters using a secure cloud forensic framework. We talk about the architecture of such framework and how can it be applied on top of new or existing cloud computing deployments. Also, for testing and results collecting we have implemented this solution to our previous developed cloud computing system.
引用
收藏
页码:80 / 88
页数:9
相关论文
共 50 条
  • [1] Logging Framework for Cloud Computing Forensic Environments
    Patrascu, Alecsandru
    Patriciu, Victor-Valeriu
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [2] Logging for Cloud Computing Forensic Systems
    Patrascu, A.
    Patriciu, V. V.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2015, 10 (02) : 222 - 229
  • [3] A secure logging scheme for forensic computing
    Kawaguchi, N
    Ueda, S
    Obata, N
    Miyaji, R
    Kaneko, S
    Shigeno, H
    Okada, K
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 386 - 393
  • [4] An Anonymous Blockchain-Based Logging System for Cloud Computing
    Liu, Ji-Yao
    He, Yun-Hua
    Wang, Chao
    Hu, Yan
    Li, Hong
    Sun, Li-Min
    [J]. BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2019, 2020, 1156 : 288 - 301
  • [5] Secure logging scheme for forensic analysis in cloud
    Sree, Thankaraja Raja
    Bhanu, Somasundaram Mary Saira
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (15):
  • [6] Design of a Forensic Enabled Secure Cloud Logging
    Rane, Sagar
    Wagh, Sanjeev
    Dixit, Arati
    [J]. PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING (ICDCN 2020), 2020,
  • [7] A Hybrid Intrusion Detection System for Cloud Computing Environments
    Jelidi, Mohamed
    Ghourabi, Abdallah
    Gasmi, Karim
    [J]. 2019 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCES (ICCIS), 2019, : 390 - 395
  • [8] Cloud Computing: Digital Forensic Solutions
    Morioka, Emi
    Sharbaf, Mehrdad S.
    [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 589 - 594
  • [9] Forensic Model for Cloud Computing: An Overview
    Alex, M. Edington
    Kishore, R.
    [J]. PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1291 - 1295
  • [10] Forensic Challenges in Mobile Cloud Computing
    Khan, Suleman
    Ahmad, Ejaz
    Shiraz, Muhammad
    Gani, Abdullah
    Wahab, Ainuddin Wahid Abdul
    Bagiwa, Mustapha Aminu
    [J]. 2014 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2014, : 343 - 347