A Digital Forensics Method in Cloud Computing Environment

Article Preview

Abstract:

In the context of the wide application of cloud computing technology, Internet crimes with the support of such technology will increase. In this article, the author proposed a holistic set of digital forensics method applicable in could computing environment from the point of the four stages of digital evidence collection, preservation, analysis and presentation. In evidence collection session, original resource of electric data collection was discussed. In evidence preservation session, electronic data storage system on Hadoop was designed. In evidence analysis session, two types of crime data were analyzed. In evidence presentation session, what the result should be shown were explained.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1471-1475

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] MELL P, GRANCE T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and Technology, (2011).

Google Scholar

[2] Danielson, Krissi. Distinguishing Cloud Computing from Utility Computing. Ebizq. net. 2008-03-26 [2010-08-22].

Google Scholar

[3] FOSTER I, YONG Z, RAICU I, et al. Cloud Computing and GridComputing 360-Degree Compared[Z]. 2008. 1-10.

Google Scholar

[4] Reuben JS. A survey on virtual machine security[R]. Helsinki University of Technology, October (2007).

Google Scholar

[5] DDoS: A Threat You Can't Afford to Ignore, Forrester whitepaper, http: /whitepapers. zdnet. com/abstract. aspx?docid=1155831.

Google Scholar

[6] Liu, F., Tong, J., Mao, J. et al. (2011) NIST Cloud Computing Reference Architecture, National Institute of Standards and Technology, Special Publication 500-292.

Google Scholar