Digital forensics cloud log unification: Implementing CADF in Apache CloudStack

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementing a Digital Forensics Lab in Education

Cybercrime is and has been on the rise for several decades and a rise in this specific criminal activity is only expected to continue. This increase in cybercrime activity results in a need for specially trained investigators. Individuals specially trained to retrieve information from computers or other digital devices are known as digital forensics investigators. These types of investigators r...

متن کامل

Sufficiency of Windows Event Log as Evidence in Digital Forensics

The prevalence of computer and the internet has brought forth the increasing spate of cybercrime activities; hence the need for evidence to attribute a crime to a suspect. The research therefore, centres on evidence, the legal standards applied to digital evidence presented in court and the main sources of evidence in the Windows OS, such as the Registry, slack space and the Windows event log. ...

متن کامل

Seeking Efficiency in Digital Forensics in Mobile and Cloud Environments

.......................................................................................................... i Sammanfattning (Abstract in Swedish) ........................................................ iii

متن کامل

Digital provenance: Enabling secure data forensics in cloud computing

Secure provenance that records the ownership and process history of data objects is vital to the success of data forensics in cloud computing. In this paper, we propose a new secure provenance scheme based on group signature and attribute-based signature techniques. The proposed provenance scheme provides confidentiality on sensitive documents stored in a cloud, unforgeability of the provenance...

متن کامل

Scenario-Based Digital Forensics Challenges in Cloud Computing

The aim of digital forensics is to extract information to answer the 5Ws (Why, When, Where, What, and Who) from the data extracted from the evidence. In order to achieve this, most digital forensic processes assume absolute control of digital evidence. However, in a cloud environment forensic investigation, this is not always possible. Additionally, the unique characteristics of cloud computing...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Information Security and Applications

سال: 2020

ISSN: 2214-2126

DOI: 10.1016/j.jisa.2020.102555