Study on Forensic Investigation of Network Crime in Cloud Computing Environment

Article Preview

Abstract:

Cloud computing is Internet-based computing, whereby shared resources, software, and information to computers and other devices on demand. Besides the benefits, it provides a new environment and convenience for network crime, which results difficulties and challenges for forensic investigation. This paper reviews the conception of cloud computing and identifies some key issues of network crime. After analyzing the mechanism and architecture of cloud computing, we propose a forensic model to obtain and fix the criminal evidences. Through investigating from cloud and client aspects, we collect relative log files and communicated data packages, which can succeed to monitor network and store original crime behaviors.

You have full access to the following eBook

Info:

Periodical:

Pages:

76-80

Citation:

Online since:

September 2011

Authors:

Export:

Share:

Citation:

[1] A. Wayne, Jansen, NIST, Cloud Hooks: Security and Privacy Issues in Cloud Computing, Proceeding of the 44th International Conference on System Science, (2011), 1-10.

DOI: 10.1109/hicss.2011.103

Google Scholar

[2] Ian Foster, Yong Zhao, Ioan Raicu, Shyong Lu, Cloud Computing and Grid Computing 360-Degree Compared, Department of Computer Science University of Chicago.

DOI: 10.1109/gce.2008.4738445

Google Scholar

[3] Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, Market-Oriented Clou Computing: Vision, Hype and Reality for Delivering IT services as Computing Utilities, Manjrasoft Pvt Ltd, Melbourne, Australia.

DOI: 10.1109/hpcc.2008.172

Google Scholar

[4] T. Rohini, Comparative Approach to Cloud Security Models, Advances in Computing, Communication and Control, vol. 125, (2011), 170-177.

Google Scholar

[5] D. Cappelli, A. Moore, R. Trzeciak, T.J. Shimeall, Common Sense Guide to Prevention and Detection of Insider Threats, 3rd Edition, Version 3, CERT, Jan. (2009).

DOI: 10.21236/ada585500

Google Scholar

[6] E. Kowalski, T. Conway, etc., Insider Threat Study: Illicit Cyber Activity in the Government Sector, Software Engineering Institute, Jan. (2008) http: /www. secretservice. gov/ntac/final_government_sector2008_0109. pdf.

Google Scholar

[7] Chow, Golle, Jakobsson, Masuoka, Molina, Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control", CCSW, 09, November 13, Chicago, Illinois, USA, (2009).

DOI: 10.1145/1655008.1655020

Google Scholar