An Efficient Approach to Forensic Investigation in Cloud Using VM Snapshots

Authors

  • Soleha Magdum  AISSMS Polytechnic, Pune, Maharashtra, India
  • Nikhil Kandula  AISSMS Polytechnic, Pune, Maharashtra, India
  • Tejal Adep  AISSMS Polytechnic, Pune, Maharashtra, India
  • Harshali Shinde  AISSMS Polytechnic, Pune, Maharashtra, India
  • A. S. Khandagle  AISSMS Polytechnic, Pune, Maharashtra, India

Keywords:

Digital Forensics, Cloud Computing, Virtual Machine (VM), Cloud Service Provider (CSP), Intrusion Detection System (IDS)

Abstract

Cloud computing has recently emerged as a technology to allow users/clients to access infrastructure, storage, software and deployment environment based on a pay-for-what-they-use model. Traditional digital forensics cannot handle the multi-tenant and dynamic nature of the cloud environment as it has to address various technical, legal, and organizational challenges pertaining to the cloud systems. The dynamic nature of cloud computing gives abundant opportunities to enable digital investigations in the cloud environment. This paper addresses the challenges of digital forensics in the cloud environment and existing solutions to ease some of the challenges. We propose an efficient approach to forensic investigation in cloud using Virtual Machine (VM) snapshots.

References

  1. Deevi Radha Rani, G. Geethakumari "An Efficient Approach to Forensic Investigation in Cloud using VM Snapshots" International Conference on Pervasive Computing (ICPC), 2015.
  2. BKSP Kumar Raju Alluri, Geethakumari G"A Digital Forensic Model for Introspection of Virtual Machines in Cloud Computing" IEEE, 2015.
  3. Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun "Assisted Deletion of Related Content"ACM, 2014.
  4. Mr. Digambar Powar, Dr. G. Geethakumari "Digital Evidence Detection in Virtual Environment for Cloud Computing" ACM, 2012.
  5. Saibharath S, Geethakumari G "Cloud Forensics: Evidence Collection and Preliminary Analysis" IEEE, 2015
  6. Mr. Chandrashekhar S. Pawar, Mr. Pankaj R. Patil, Mr. Sujitkumar V. Chaudhari "Providing Security and Integrity for Data Stored In Cloud Storage" ICICES, 2014.
  7. Curtis Jackson, Rajeev Agarwal, Jessie Walker, William Grosky "Scenario-based Design for a Cloud Forensics Portal" IEEE, 2015.
  8. NIST, "NIST Cloud Computing Forensic Science Challenges", National Institute of Standards and Technology Interagency or Internal Report 8006, 2014.

WEBSITE:

  1. Jaonie M. Wexler, Apple bonjour just yet, http://www.webtorials.com/content/2012/04/dont-rush-to-bid-adieu-to-apple-bonjour-just-yet.html
  2. David Maxwell, Cloud Lounge,http://www.cloud-lounge.org/why-use-clouds.html

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Soleha Magdum, Nikhil Kandula, Tejal Adep, Harshali Shinde, A. S. Khandagle, " An Efficient Approach to Forensic Investigation in Cloud Using VM Snapshots , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.1141-1144, November-December-2017.