2012 IEEE 36th Annual Computer Software and Applications Conference Workshops 2012
DOI: 10.1109/compsacw.2012.44
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Log Forensics Metadata Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 3 publications
0
12
0
Order By: Relevance
“…Although, this is possible with copies of a virtual machine within a privately managed cloud, it requires additional evidence for say a storage device like Amazon's Simple Storage Solution (S3). If one assumes that the providers retains the IaaS, PaaS and SaaS logs of what files are deleted , who deleted them, and when and where they were deleted that could be useful metadata even if the content proves unrecoverable [11].…”
Section: Cloud Forensicsmentioning
confidence: 99%
“…Although, this is possible with copies of a virtual machine within a privately managed cloud, it requires additional evidence for say a storage device like Amazon's Simple Storage Solution (S3). If one assumes that the providers retains the IaaS, PaaS and SaaS logs of what files are deleted , who deleted them, and when and where they were deleted that could be useful metadata even if the content proves unrecoverable [11].…”
Section: Cloud Forensicsmentioning
confidence: 99%
“…The limitation of this approach is that user needs to depend on CSP to acquire the evidence. Thorpe et al introduces the survey on high‐level trust arises in acquiring log forensic evidence from VM host OS within the data cloud . The data acquisition, in particular, the hypervisor system logs, is used to track VM instances to compile potential evidence for cloud investigations.…”
Section: Related Workmentioning
confidence: 99%
“…However, in this section, we target the literature that discusses digital forensics of distributed applications based on virtualisation as in Belorkar and Geethakumari (2011), Delport and Olivier (2012), Dykstra and Sherman (2013), Jawale and Narayanan (2011), Quick and Choo (2013) and Thorpe et. al.…”
Section: Virtulisationmentioning
confidence: 99%
“…(2012). Given the correlation between Dimension II and III and to avoid repetition, Delport and Olivier (2012), Dykstra and Sherman (2013) and Thorpe et. al.…”
Section: Virtulisationmentioning
confidence: 99%