Logging for Cloud Computing Forensic Systems
AbstractCloud computing represents a different paradigm in the field of distributed computing that involves more and more researchers. We can see in this context the need to know exactly where, when and how a piece of data is processed or stored. Compared with classic digital forensic, the field of cloud forensic has a lot of difficulties because data is not stored on a single place and furthermore it involves the use of virtualization technologies. In this paper we present in detail a new way of monitoring activity in cloud environments and datacenters using a secure cloud forensic framework. We talk about what architecture must this framework implement and how can it be applied on top of new or existing cloud computing deployments. For testing and results we have implemented this solution to our previous developed cloud computing system.
 R. Marty (2011); Cloud Application Logging for Forensics, Proceedings of the 2011 ACM Symposium on Applied Computing, 178-184.
 G. Sibiya, H. Venter, T. Fogwill (2012); Digital forensic framework for a cloud environment, Proceedings of the 2012 Africa Conference, 1-8.
 A. Pătraşcu and V. Patriciu (2013); Beyond Digital Forensics. A Cloud Computing Perspective Over Incident Response and Reporting, IEEE International Symposium on Applied Computational Intelligence and Informatics, 455-460.
 B. Grobauer and T. Schreck (2010); Towards incident handling in the cloud: challenges and approaches, Proceedings of the 2010 ACM workshop on Cloud computing security workshop, New York, DOI: 10.1145/1866835.1866850, 77-86.
 A. Pătraşcu, C. Leordeanu, C. Dobre and V. Cristea (2012); ReC2S: Reliable Cloud Computing System, European Concurrent Engineering Conference, Bucharest, 1-9.
 M. Simmons and H. Chi (2012); Designing and implementing cloud-based digital forensics, Proceedings of the 2012 Information Security Curriculum Development Conference, 69-74.
 T. Takahashi, Y. Kadobayashi and H. Fujiwara (2010); Ontological Approach toward Cybersecurity in Cloud Computing, SIN'10 Proceedings of the 3rd international conference on Security of information and networks, DOI: 10.1145/1854099.1854121, 100-109.
 NIST SP800-86 Notes, Guide to Integrating Forensic Techniques into Incident Response, http://cybersd.com/sec2/800-86Summary.pdf
 A. Pătraşcu and V. Patriciu (2014); Logging system for cloud computing forensic environments, Journal of Control Engineering and Applied Informatics, 16(1): 80-88.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.