What is digital forensics? Explore the information of the digital forensics in cloud computing.
The study comprises of the information of the Digital Forensics in Cloud Computing. Cloud computing refers to the process of delivering and hosting services over the internet. The main advantages of it are that the user can subscribe the service on the monthly basis or as per usage (Patrascu & Patriciu, 2013). The parallel processing, networking, cryptography are the main information technology aspects through which cloud computing characterises a computing pattern which involves multiple researchers (Martini & Choo, 2012).
The issues that have been facing regarding cloud forensics can be categorised as following.
The digital investigation refers to the process of governing the forensic evidence of information. In respect of the technical perspective, it can be stated that the information is available at three distinct phases such as at rest, in motion and in execution.
The first toward obtaining a sound working platform is to have the concept of a cloud computing framework. Te framework contains two primary layers such as management layer and virtualization layer.
Figure 1: The Cloud Framework
The virtualization layer holds workstations that contain the VM’s hosts and comprise of virtually enabled hardware. The modules in the framework are as following.
After the presentation of the notions of the cloud framework, the modification in order to construct the cloud computing structure forensic enable is required. The prime objective of the forensic enables framework is to collect all the log and forensic information from the virtual machines which are on gong within the virtualization level (Zawoad & Hasan, 2013). A common interface for cloud forensic has to be developed as a sequence of impartial kernel modules. In addition, through the process user space applications must be disabled or activated at runtime. The objective is to offer the users an opportunity for handling the interface with the kernel building menu. Here comes the concept of the kernel-based virtual machine or KVM (Shirkhedkar & Patil, 2014). It is a completely virtualized application which can be get in the mainline distributions of the Linux kernel. The kernel runs as a hardware with AMD or Intel processor.
In order to test the approach two scenarios have been provided, one is forensic enabled structure and the other is basic cloud computing structure. The nodes accountable by means of management, virtualization, virtual machines storage space and forensics level have been symbolized as a group of servers. The hardware that was utilized was comprised of AMD Phenom II X6, 8GB RAM, 6 cores RAID0 configured hard-disks which runs on KVM and QEMU. The QEMU have been used as a hypervisor interface. In addition with that, the platform was consisting of many other components such as an Intel DualCore, AMD C-60 DualCore, 4GB which acts as and storage layer and 4GB RAM that acts as the management layer (Patrascu & Patriciu, 2014). For the network layer 10/100 MB was used. A Node.JS Modue has been used for the testing. It will allow to get all the parameters from the V8 virtual machine. The test has been conducted through steps such as observe, measure and analyze the network transmission overhead and communication.
# |
Lease formation time (mili second) |
Lease check (mili second) |
Time for Lease mount up (mili second) |
1 |
204 |
10 |
1 |
2 |
289 |
11 |
1 |
3 |
205 |
11 |
1 |
4 |
262 |
10 |
1 |
Table 1: Result Table of Lease Manager
6. Conclusion:
From the above study it can be concluded that the digital forensic investigation on cloud is a very critical task. The solutions were very sound and effective. I addition, the solutions were secure and reliable. The discussion of the layers and their characteristics provided the information that assisted in understanding the framework properly. By the days gone, more scientists are getting attracted toward the incident response and computing forensics. The focus of the study was to enhance the safety, availability, security and reliability of the cloud computing system. Due to the geographical distribution and heterogeneity some issues regarding the secure resource management is faced. In various aspects of the system there exist challenges while carrying out tasks of digital forensics on cloud.
References:
Al Fahdi, M., Clarke, N. L., & Furnell, S. M. (2013). Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. In Information Security for South Africa, 2013 (pp. 1-8). IEEE.
Chung, H., Park, J., Lee, S., & Kang, C. (2012). Digital forensic investigation of cloud storage services. Digital investigation, 9(2), 81-95.
Daryabar, F., Dehghantanha, A., & Udzir, N. I. (2013). A review on impacts of cloud computing on digital forensics. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 2(2), 77-94.
Dykstra, J., & Sherman, A. T. (2013). Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digital Investigation, 10, S87-S95.
Martini, B., & Choo, K. K. R. (2012). An integrated conceptual digital forensic framework for cloud computing. Digital Investigation, 9(2), 71-80.
Patrascu, A., & Patriciu, V. V. (2013). Beyond digital forensics. A cloud computing perspective over incident response and reporting. In Applied Computational Intelligence and Informatics (SACI), 2013 IEEE 8th International Symposium on (pp. 455-460). IEEE.
PATRASCU, A., & Patriciu, V. V. (2014). Digital Forensics in Cloud Computing. Advances in Electrical and Computer Engineering, 14(2).
Ruan, K., Carthy, J., Kechadi, T., & Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation, 10(1), 34-43.
Sang, T. (2013). A log based approach to make digital forensics easier on cloud computing. In Intelligent System Design and Engineering Applications (ISDEA), 2013 Third International Conference on (pp. 91-94). IEEE.
Shirkhedkar, D., & Patil, S. (2014). Design of digital forensic technique for cloud computing. International Journal, 2(6).
Sibiya, G., Venter, H. S., & Fogwill, T. (2012). Digital forensic framework for a cloud environment.
Zawoad, S., & Hasan, R. (2013). Digital forensics in the cloud. ALABAMA UNIV IN BIRMINGHAM.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download