dc.contributor.author |
Sibiya, G
|
|
dc.contributor.author |
Venter, HS
|
|
dc.contributor.author |
Fogwill, T
|
|
dc.date.accessioned |
2012-05-31T09:10:50Z |
|
dc.date.available |
2012-05-31T09:10:50Z |
|
dc.date.issued |
2012-05 |
|
dc.identifier.citation |
Sibiya, G, Venter, HS and Fogwill, T. Digital forensic framework for a cloud environment. IST-Africa 2012 Conference Proceedings, Tanzania, 9 May 2012 |
en_US |
dc.identifier.isbn |
978-1-905824-34-2 |
|
dc.identifier.uri |
http://hdl.handle.net/10204/5890
|
|
dc.description |
IST-Africa 2012 Conference Proceedings, Tanzania, 9 May 2012 |
en_US |
dc.description.abstract |
The advent of cloud computing provides good opportunities for both good and malicious use. Cloud computing is at its infancy stage and its security is still an open research issue. Malicious users take advantage of the current lack of advanced security mechanisms in the cloud. Cloud computing paradigm enables users to access computing resources without necessarily owning physical infrastructures. It is therefore easy for an attacker who intends to perform malicious activities in the cloud to create a remotely hosted desktop, perform their activities and then destroy the desktop later. With the remotely hosted desktop destroyed, there is very little evidence left that can be collected by forensic experts using traditional static digital forensic methods. A scenario such as this therefore requires live digital forensic processes as a large amount of evidence can be gathered while the system is running. Key issues in cloud forensics include, but are not limited to, identity, encryption, and jurisdiction and data distribution. Digital forensic investigators currently face a challenge when criminal incidences occur as there are no well developed tools and procedures for conducting digital forensic investigations in the cloud. This paper proposes a novel framework that addresses issues of digital forensics in the cloud computing environment. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
International Information Management Corporation (IIMC) |
en_US |
dc.relation.ispartofseries |
Workflow;8611 |
|
dc.subject |
Cloud computing |
en_US |
dc.subject |
Digital forensics |
en_US |
dc.subject |
Information systems security |
en_US |
dc.title |
Digital forensic framework for a cloud environment |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Sibiya, G., Venter, H., & Fogwill, T. (2012). Digital forensic framework for a cloud environment. International Information Management Corporation (IIMC). http://hdl.handle.net/10204/5890 |
en_ZA |
dc.identifier.chicagocitation |
Sibiya, G, HS Venter, and T Fogwill. "Digital forensic framework for a cloud environment." (2012): http://hdl.handle.net/10204/5890 |
en_ZA |
dc.identifier.vancouvercitation |
Sibiya G, Venter H, Fogwill T, Digital forensic framework for a cloud environment; International Information Management Corporation (IIMC); 2012. http://hdl.handle.net/10204/5890 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Sibiya, G
AU - Venter, HS
AU - Fogwill, T
AB - The advent of cloud computing provides good opportunities for both good and malicious use. Cloud computing is at its infancy stage and its security is still an open research issue. Malicious users take advantage of the current lack of advanced security mechanisms in the cloud. Cloud computing paradigm enables users to access computing resources without necessarily owning physical infrastructures. It is therefore easy for an attacker who intends to perform malicious activities in the cloud to create a remotely hosted desktop, perform their activities and then destroy the desktop later. With the remotely hosted desktop destroyed, there is very little evidence left that can be collected by forensic experts using traditional static digital forensic methods. A scenario such as this therefore requires live digital forensic processes as a large amount of evidence can be gathered while the system is running. Key issues in cloud forensics include, but are not limited to, identity, encryption, and jurisdiction and data distribution. Digital forensic investigators currently face a challenge when criminal incidences occur as there are no well developed tools and procedures for conducting digital forensic investigations in the cloud. This paper proposes a novel framework that addresses issues of digital forensics in the cloud computing environment.
DA - 2012-05
DB - ResearchSpace
DP - CSIR
KW - Cloud computing
KW - Digital forensics
KW - Information systems security
LK - https://researchspace.csir.co.za
PY - 2012
SM - 978-1-905824-34-2
T1 - Digital forensic framework for a cloud environment
TI - Digital forensic framework for a cloud environment
UR - http://hdl.handle.net/10204/5890
ER -
|
en_ZA |