DSpace
 

Researchspace >
General science, engineering & technology >
General science, engineering & technology >
General science, engineering & technology >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10204/5890

Title: Digital forensic framework for a cloud environment
Authors: Sibiya, G
Venter, HS
Fogwill, T
Keywords: Cloud computing
Digital forensics
Information systems security
Issue Date: May-2012
Publisher: International Information Management Corporation (IIMC)
Citation: Sibiya, G, Venter, HS and Fogwill, T. Digital forensic framework for a cloud environment. IST-Africa 2012 Conference Proceedings, Tanzania, 9 May 2012
Series/Report no.: Workflow;8611
Abstract: The advent of cloud computing provides good opportunities for both good and malicious use. Cloud computing is at its infancy stage and its security is still an open research issue. Malicious users take advantage of the current lack of advanced security mechanisms in the cloud. Cloud computing paradigm enables users to access computing resources without necessarily owning physical infrastructures. It is therefore easy for an attacker who intends to perform malicious activities in the cloud to create a remotely hosted desktop, perform their activities and then destroy the desktop later. With the remotely hosted desktop destroyed, there is very little evidence left that can be collected by forensic experts using traditional static digital forensic methods. A scenario such as this therefore requires live digital forensic processes as a large amount of evidence can be gathered while the system is running. Key issues in cloud forensics include, but are not limited to, identity, encryption, and jurisdiction and data distribution. Digital forensic investigators currently face a challenge when criminal incidences occur as there are no well developed tools and procedures for conducting digital forensic investigations in the cloud. This paper proposes a novel framework that addresses issues of digital forensics in the cloud computing environment.
Description: IST-Africa 2012 Conference Proceedings, Tanzania, 9 May 2012
URI: http://hdl.handle.net/10204/5890
ISBN: 978-1-905824-34-2
Appears in Collections:Information security
Digital intelligence
General science, engineering & technology

Files in This Item:

File Description SizeFormat
Sibiya_2012.pdf148.38 kBAdobe PDFView/Open
View Statistics

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

 

Valid XHTML 1.0! DSpace Software Copyright © 2002-2010  Duraspace - Feedback