Securing Digital Forensics on Cloud Computing through Log based Accession

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)
 
© 2014 by IJCTT Journal
Volume-16 Number-2
Year of Publication : 2014
Authors : Raju Kadari , Janapati Venkata Krishna

MLA

Raju Kadari , Janapati Venkata Krishna. "Securing Digital Forensics on Cloud Computing through Log based Accession". International Journal of Computer Trends and Technology (IJCTT) V16(2):81-84, Oct 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud computing is getting huge attention from the IT industry recently. Almost all the top most companies of the IT sector showing their interest and efforts on cloud computing and release services about cloud computing in succession. But it is vulnerable for security threats. If we want to make it go further, we should pay more attention on security threats. Particularly the Internet environment now has become unsecure. The number of crime on internet has increased at a great rate in last decades, and this unsecurity will be very fast on the cloud computing environment in future. We should further improve the cloud computing not only at the feature of precaution, but also at the feature of dealing with the security events to defend it from the crime persuit. In this paper, I propose a perspective which using logs model to build a forensic-friendly system. Using this forensic-friedly system model we can quickly gather information from cloud computing for some kinds of forensic purpose. And this perspective decrease the complexity of those kinds of forensics.

References
[1] D. Brezinski and T. Killalea. Guidelines for evidence collection and archiving. RFC 3227, IETF, 2002.
[2] Birk, D.; Wegener, C. Technical Issues of Forensic Investigations in Cloud Computing Environments. 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pages: 1-10, 2011.
[3] Ahmed, S.; Raja, M.Y.A. Tackling cloud security issues and forensics model. High-Capacity Optical Networks and Enabling Technologies (HONET), pages: 190-195, 2010.
[4] Stephen D. Wolthusen, Overcast: Forensic Discovery in Cloud Environments, 5th International Conference on IT Security Incident Management and IT Forensics, pages: 3-9, 2009.
[5] Cheng Yan, Cybercrime forensic system in cloud computing, Image Analysis and Signal Processing (IASP), pages: 612-615, 2011.
[6] Stephen Biggs, Stilianos Vidalis. Cloud Computing: The impact on digital forensic investigations. International Conference for Internet Technology and Secured Transactions, pages: 1-6, 2009.
[7] Hong Guo; Bo Jing. Forensic investigations in Cloud environments. International Conference on Computer Science and Information Processing (CSIP), pages: 248-251, 2012.

Keywords
digital-forensic,log,cloud-computing, security.