Digital forensics cloud log unification: Implementing CADF in Apache CloudStack
نویسندگان
چکیده
منابع مشابه
Implementing a Digital Forensics Lab in Education
Cybercrime is and has been on the rise for several decades and a rise in this specific criminal activity is only expected to continue. This increase in cybercrime activity results in a need for specially trained investigators. Individuals specially trained to retrieve information from computers or other digital devices are known as digital forensics investigators. These types of investigators r...
متن کاملSufficiency of Windows Event Log as Evidence in Digital Forensics
The prevalence of computer and the internet has brought forth the increasing spate of cybercrime activities; hence the need for evidence to attribute a crime to a suspect. The research therefore, centres on evidence, the legal standards applied to digital evidence presented in court and the main sources of evidence in the Windows OS, such as the Registry, slack space and the Windows event log. ...
متن کاملSeeking Efficiency in Digital Forensics in Mobile and Cloud Environments
.......................................................................................................... i Sammanfattning (Abstract in Swedish) ........................................................ iii
متن کاملDigital provenance: Enabling secure data forensics in cloud computing
Secure provenance that records the ownership and process history of data objects is vital to the success of data forensics in cloud computing. In this paper, we propose a new secure provenance scheme based on group signature and attribute-based signature techniques. The proposed provenance scheme provides confidentiality on sensitive documents stored in a cloud, unforgeability of the provenance...
متن کاملScenario-Based Digital Forensics Challenges in Cloud Computing
The aim of digital forensics is to extract information to answer the 5Ws (Why, When, Where, What, and Who) from the data extracted from the evidence. In order to achieve this, most digital forensic processes assume absolute control of digital evidence. However, in a cloud environment forensic investigation, this is not always possible. Additionally, the unique characteristics of cloud computing...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Information Security and Applications
سال: 2020
ISSN: 2214-2126
DOI: 10.1016/j.jisa.2020.102555