2018
DOI: 10.1186/s13677-018-0119-2
|View full text |Cite
|
Sign up to set email alerts
|

LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments

Abstract: This paper presents the LogDrive framework for mitigating the following problems of storage forensics in Infrastructure-as-a-Service (IaaS) cloud environments: volatility, increasing volume of forensic data, and anti-forensic attacks that hide traces of incidents in virtual machines. The proposed proactive data collection function of virtual block devices mitigates the problem of volatility within the cloud environments and enables a time-traveling investigation to reveal overwritten or deleted evidence files.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…The objective of each GAN network optimization is redefined as a ame between the generated model and the discriminant model with the constraint of the epresentation vector. As can be seen from Figure 3, the GAN network of each SAR view generates the representation ector c [23,24] from the coding model before the training begins. In the training process, the model is generated with the random variable z sampled from the normal distribution as the input and he representation vector c as the constraint condition.…”
Section: Multi View Data Generation Of Symmetric Difference Kernel Samentioning
confidence: 99%
“…The objective of each GAN network optimization is redefined as a ame between the generated model and the discriminant model with the constraint of the epresentation vector. As can be seen from Figure 3, the GAN network of each SAR view generates the representation ector c [23,24] from the coding model before the training begins. In the training process, the model is generated with the random variable z sampled from the normal distribution as the input and he representation vector c as the constraint condition.…”
Section: Multi View Data Generation Of Symmetric Difference Kernel Samentioning
confidence: 99%
“…Many applications, such as financial transactions, can be carried out anywhere and anytime, as long as an internet connection and supporting devices are available. This growth, however, coincides with the increasing possibility of the sensitive data being compromised [1,2,3], including those in a big data environment [4,5], considering the characteristics of users [6]. This condition has turned security into an essential factor, especially in transmitting and distributing those data.…”
Section: Introductionmentioning
confidence: 99%
“…HetNet includes a traditional macrocellular network and new junior units that use millimeter waves for backhaul and link access. In addition, the concept of split control plane (CP) and user plane (UP) is introduced in HetNet [17][18][19][20]. In CP/UP split HetNet, the traditional macrocell provides the CP with a large area coverage, while UP data is provided by the millimeter wave junior unit.…”
Section: Introductionmentioning
confidence: 99%