首页> 外文OA文献 >Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing
【2h】

Proactive Model for Locating and Collecting Cybercrime Evidences on Cloud Computing

机译:定位和收集云计算网络犯罪证据的主动模型

摘要

The high scalability of cloud computing provides more opportunities to business and IT organization to develop high end computing services with low cost. Businesses has been given many choices in selecting cloud service providers as this process requires careful thinking to weight the advantages against the possible drawbacks of losing control on resources, applications and data storage. Despite the advancement of cloud storage and the advantageous it brings to all computer users, cloud storage is still subjected to misuse of malicious users and criminals. This includes the use of cloud storage for storing and exchanging illegal material and for committing botnet attacks. In fact, increasing number of crimes against cloud storage makes udthe investigation process of extracting and collecting cybercrime evidences in cloud forensics more challenging. Although a number of researches and solutions are proposed to address cloud computing security, several studies and surveys reported that security in cloud computing still posing several challenges to the researchers. Loss of control over the data stored in cloud computing is one of the security challenge in that clouds. Location of data storage in the cloud and the multi tenancy of customers on cloud servers are all representing security concerns. At the same time, cloud technology nowadays is also creating udchallenges for forensic practitioners. This paper reviews the current challenges in cloud forensic and propose a proactive model to improve the process of locating and collecting cybercrime evidences in cloud computing. The objective of this paper is two pronged. Former is to study the existing digital evidence collection methodology, the location and the data fragments left on user’s computer prior to the usage of cloud storage application. Last is find the location and the data fragments left on user’s udcomputer prior to the usage of cloud storage application for new cloud storage.
机译:云计算的高可伸缩性为企业和IT组织提供了更多以低成本开发高端计算服务的机会。在选择云服务提供商时,已经为企业提供了许多选择,因为此过程需要仔细考虑以权衡优势,以防失去对资源,应用程序和数据存储的控制权。尽管云存储得到了进步,并给所有计算机用户带来了好处,但云存储仍然遭受滥用恶意用户和犯罪分子的侵害。这包括使用云存储来存储和交换非法材料以及进行僵尸网络攻击。实际上,针对云存储的犯罪数量不断增加,使得在云取证中提取和收集网络犯罪证据的调查过程更具挑战性。尽管提出了许多解决云计算安全性的研究和解决方案,但是一些研究和调查报告指出,云计算中的安全性仍然给研究人员带来了一些挑战。对存储在云计算中的数据失去控制是该云中的安全挑战之一。云中数据存储的位置以及云服务器上客户的多租户都代表着安全问题。同时,如今的云技术也正在为法医从业者制造挑战。本文回顾了云法证学当前面临的挑战,并提出了一种主动模型来改善在云计算中查找和收集网络犯罪证据的过程。本文的目的有两个方面。前者将研究现有的数字证据收集方法,在使用云存储应用程序之前留在用户计算机上的位置和数据片段。最后是在将云存储应用程序用于新的云存储之前,找到用户 ud计算机上剩余的位置和数据片段。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号