Preview

log files

Best Essays
Open Document
Open Document
2845 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
log files
2013 Third International Conference on Intelligent System Design and Engineering Applications

A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
Ting Sang
Shanghai Jiao Tong University, Shanghai, 200240, China. saintogod@gmail.com In this paper I will focus on analyzing challenge for forensic investigation in cloud environments. The rest paper is organized as following. In section II, I will show what cloud computing and digital forensics is. And the next section is about the challenges that introduced by cloud computing to digital forensic. I will show a model that can make the cloud computing friendlier to digital forensics in section IV. At last, in section V, a conclusion is given.

Abstract-Cloud computing is getting more and more attention from the information and communication technologies industry recently. Almost all the leading companies of the information area show their interesting and efforts on cloud computing and release services about cloud computing in succession. But if want to make it go further, we should pay more effort on security issues. Especially, the Internet environment now has become more and more unsecure. With the popularization of computers and intelligent devices, the number of crime on them has increased rapidly in last decades, and will be quicker on the cloud computing environment in future. No wall is wall in the world. We should enhance the cloud computing not only at the aspect of precaution, but also at the aspect of dealing with the security events to defend it from crime activities. In this paper, I propose a approach which using logs model to building a forensic-friendly system.
Using this model we can quickly gather information from cloud computing for some kinds of forensic purpose. And this will decrease the complexity of those kinds of forensics.

II.

A. Cloud Computing
In this era of globalization, concentrating is the only way to success for the small



References: archiving. RFC 3227, IETF, 2002. Systematic Approaches to Digital Forensic Engineering (SADFE), pages: 1-10, 2011. Technologies (HONET), pages: 190-195, 2010. Management and IT Forensics, pages: 3-9, 2009. Cheng Yan, Cybercrime forensic system in cloud computing, Image Analysis and Signal Processing (IASP), pages: 612-615, 2011. Technology and Secured Transactions, pages: 1-6, 2009. International Conference on Computer Science and Information Processing (CSIP), pages: 248-251, 2012.

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    During your induction we discussed the importance of reflection, and ways in which this can be done.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Class List Log

    • 358 Words
    • 2 Pages

    A class list log is a method or format to record one or shorter, specific pieces of information about each child present on that day. It is quick and easy way for teachers to jot down information about the children. A class list log can be used for many things such as attendance or behavior. It helps teachers to keep track of the things that children do throughout the day. It is important to remember to write down the observations you see as they happen! A class list is also something that a teacher can look back on and make comparisons to! Teachers can learn so much through these kinds of logs. They can learn why certain behaviors occur, about the children’s language, small muscles, and etc. One of my examples of a class list log is to observe…

    • 358 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    evidence log sheet

    • 442 Words
    • 2 Pages

    Analyze each piece of evidence presented to your investigative team. Record relevant findings for each artifact in the log sheet below. You do not need to analyze the documents in a specific order. Remember that what you do not find may actually be just as important as information that you do find. Note: Items listed with an * are part of Evidence Report #2.…

    • 442 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Log for Gym Flvs

    • 835 Words
    • 4 Pages

    Add 20-30 minutes of cardio to your warm-up and stretch routine. Circle the activity that you will do.…

    • 835 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Files

    • 1706 Words
    • 7 Pages

    In the history of hockey Gordie Howe was not only one of the greatest players to ever hit the ice he was literally a game changer. On and off the ice it was easy to tell from his early playing days in the USHL that Gordie was special. Gordie Howe possessed skills never seen by any hockey player before and rarely seen since. Howe would very quickly evolve, later being signed by the NHL’s Detroit Red Wings in 1946. Over the next 33 years Gordie Howe was in the game of pro hockey (NHL or WHA). He set numerous records over the years such as most goals ever scored in NHL history at 801 (since surpassed by Wayne Gretzky) and most NHL games ever played. Gordie Howe’s impact on the games will be remembered forever. For being able to change the way hockey was played Gordie Howe was able to evolve and shape the game of hockey over the 33 years in which he played is how Gordie Howe has contributed to the shaping of Canada’s identity.…

    • 1706 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Module 5 Journal

    • 431 Words
    • 2 Pages

    Create a car saying (Bumper Sticker) or a Road Sign (Billboard) that would describe one main point you learned in Module 5. This is an example of a bumper sticker from a former student: ““Driving the right speed is always a good deed. Enjoy your ride and don’t collide!”…

    • 431 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    I strongly believe that we should get rid of reading logs. Because it just brings stress to the kids of getting their parent to sign the reading log, because they know if their parent does not sign their reading log the grade will go down. Secondly reading should be a gift you should not have to think of it as a chore. You should be able to get into a good book without thinking about how long you are reading for. By getting rid of reading logs if you don't have the full time you won't have to walk into school stressed out because you know your grade is going to go down.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Breadwinner Reading Log

    • 2435 Words
    • 10 Pages

    The Breadwinner by Deborah Ellis is set in war-ravaged Kabul, Afghanistan during the Taliban’s rule of the country. The quote, “There had been a war going on in Afghanistan for more than twenty years”(13) indicates that it probably took place in the Taliban’s early rule between 1996 and 1998. The protagonist is a young eleven year girl named Parvana who has spent most of her life witnessing and suffering from the turmoil in her country. At the beginning of the story, she appears to be a naive and ordinary girl in the sixth grade who innocently believes that, when the Taliban close down the girls’ schools, she is getting a short holiday from school.…

    • 2435 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Shadowing Log

    • 1121 Words
    • 5 Pages

    Present a short summary of the activities and situations you have observed during shadowing (100 words)…

    • 1121 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    My Files

    • 576 Words
    • 3 Pages

    Read each statement in the chart below very carefully. Answer each statement with: Never, Sometimes, or Always. (18 points)…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Today my friends and I did a debate about should we keep reading logs or should we give them away. I say that we should keep them! Three reasons why we should keep them is because. One, getting good grades for school. Another reason why we should keep reading logs is because it keeps you focused and help us summarize and organized. And why they are just good for reading! So I am going to talk about those three topics today. Are you ready? Then let’s go!…

    • 502 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Network Forensic

    • 389 Words
    • 2 Pages

    Data Communication and Networking seminar on High-Speed Broadband (HSBB) was organized by class of ITT 730, Group C770P2A and C770P1M. It was running on 12th May 2012 at Dewan Al-Ghazali, FSKM. The speaker, Mr. Masdi Mohamed is from Telekom Malaysia and has been graduated his Master in IT (UiTM) and BSC (Communication Engineering) USM. He had experience 20 years in Telecommunication industry focus on Access Network. Title of the presentation is “The design of HSBB Access Network (HSBB) architecture to support PPP agreement with Government”.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Syblogs

    • 2557 Words
    • 11 Pages

    In the last three decades or so, referring to the internet as a space that is somehow limitless, full of radical possibilities, an almost class-less space has become a trend of sorts. Especially after Donna Haraway's seminal essay 'The Cyborg Manifesto' - where the 'Cyborg' is an organism whose boundaries of 'human-ness' are blurred with his or her identities achieved via technology - imagining the internet to be a site that can allow for multiple identities, reworking and using fluid and unfixed gender identities and subverting one's notion of gender identity is a very powerful idea. In that vein, information networks are seen as sites for escape from the gender systems of everyday life, a Promised Land of sorts, one especially suited for women and 'feminine modes of communication'. At the same time, the general practice is to think of the Cyborg as an almost benign creature, akin to the fetishist notion of the female robot used in pop culture, which is paradoxically oversexualised and yet has no equipment for sexual intercourse. This notion of a ‘genderless Cyborg’ can be crystallized in Takashi Murakami’s sculpture Hiropon which depicts such a Cyborg: naked, lacking genitals and spurting copious amounts of breast milk; she is a fantasy, able to nurture without the threat of reproductive capacity.…

    • 2557 Words
    • 11 Pages
    Powerful Essays