Abstract-Cloud computing is a harbinger to a newer era in the field of computing where distributed and centralized services are used in a unique way. In cloud computing, the computational resources of different vendors and IT services providers are managed for providing an enormous and a scalable computing services platform that offers efficient data processing coupled with better QoS at a lower cost. The on-demand dynamic and scalable resource allocation is the main motif behind the development and deployment of cloud computing. The potential growth in this area and the presence of some dominant organizations with abundant resources (like Google, Amazon, Salesforce, Rackspace, Azure, GoGrid), make the field of cloud computing more fascinating. All the cloud computing processes need to be in unanimity to dole out better QoS i.e., to provide better software functionality, meet the tenant's requirements for their desired processing power and to exploit elevated bandwidth.. However, several technical and functional e.g., pervasive access to resources, dynamic discovery, on the fly access and composition of resources pose serious challenges for cloud computing. In this study, the performance issues in cloud computing are discussed. A number of schemes pertaining to QoS issues are critically analyzed to point out their strengths and weaknesses. Some of the performance parameters at the three basic layers of the cloud -Infrastructure as a Service, Platform as a Service and Software as a Service -are also discussed in this paper.
There are different product maintenance and support techniques. These previous techniques do not solve user/clients bugs, issues and enhancements effectively and efficiently. Scrum is being used now a day as a quick, flexible and holistic methodology to develop software. In Scrum projects there is the much customer involvement is included which help to develop a user oriented product. Users can change their requirements in Scrum. Many techniques have been proposed for product maintenance and support. However, in this paper, there have been a detailed literature review of existing product maintenance techniques and also presented a new proposed model and technique for the product maintenance by using Scrum methodology. This Scrum based model for maintenance is designed and based on the analysis of client request types and severity (priority). In our approach, The Session attendees (Scrum Master, Product Owner and Team) choose that bug, issue or enhancement first which has an urgent type or higher priority request and resolves it then select low priority request or non-urgent requests and facilitates the clients in timely manner. In this way this proposed model works effectively and defiantly to meet the customer's demand. A comprehensive study on product maintenance and support has been carried out which adds to the current practices in the scrum. We found that maintenance phase of the scrum has been given less attention in the existing literature. In view of this, we have made an attempt to propose a novel model that focuses on the maintenance phase of scrum.
The widespread availability and extensive use of Internet across the world has caught attention of the criminals and digital crimes are occurring at an epidemic scale nowadays. The field of digital forensics is constantly evolving by employing new tools and technique to counter novel approaches employed by the criminals as well as to investigate the nature of the criminal activity and bring the culprits to justice. Traditionally, the static analysis was used to investigate the digital incidents. But due to advancement in technology and the fact that hackers are developing malware that do not leave footprint on the hard disk, the need for performing live digital forensic analysis in addition to the static analysis has become imperative. Live forensic analysis techniques have evolved during the last decade to analyses the memory content to get a better picture of the running application programmers, processes and active binaries. In this study, we look into different techniques of live analysis and critically review them by identifying their benefits and limitations. The key areas focused in this study pertain to virtualization, pagefile extraction and identifying the encryption keys.
I. Introduction Digital communication techniques such as email, SMS, blogs etc. have progressed rapidly during the last two decades. Email is one of the most commonly used communication technique. Emails can be sent/received on laptops, computers and mobile phones as well as on some other digital devices such as PDAs and Notebooks. Despite its benefits, it can also lead to malware or cyber attacks in the digital society through different means. Generally, such attacks occur over the Internet and result in serious damages like misleading functionality or data theft. To prevent or suppress these kinds of attacks, pertinent procedures must be defined to identify such threats and respond to them quickly and appropriately. Digital forensics, also known as forensic computing, is a controlled and systematic investigation that entails collecting, analyzing and validating digital evidence. Data residing on a computer or an IT device is gathered in the first step. The gathered data might be in the shape of messages, logs or email etc. Then log analysis indentifies part of the system infected by the Abstract-Due to frequent use of Internet and with technological advancements, cyber and malware attacks over the digital devices have increased manifold. Activities performed electronically can be investigated by means of digital forensic analysis methodologies. Live digital forensic tools are used for digital evidence collection and investigations of malicious activities that occurred on a standalone system or networks. Since compromised system remains active while using these tools, some serious issues relating to malicious functionalities and policy violations could lead to serious damages like data theft or data loss. In this paper, we present a critical review of the triage in live forensic. This paper discusses several techniques being used for performing live forensic analysis and critically evaluate their efficacy in terms of their applicability and reliability. A brief anecdote about the pros and cons of these techniques are also discussed. We present the findings of our study in the critical section.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.