2014 10th International Conference on Communications (COMM) 2014
DOI: 10.1109/iccomm.2014.6866662
|View full text |Cite
|
Sign up to set email alerts
|

Logging framework for cloud computing forensic environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(19 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…Patrascu et al proposed a cloud architecture to monitor the activities in a cloud environment (Patrascu, 2014). Using the proposed framework, they collected logs from different layers of the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Patrascu et al proposed a cloud architecture to monitor the activities in a cloud environment (Patrascu, 2014). Using the proposed framework, they collected logs from different layers of the cloud.…”
Section: Related Workmentioning
confidence: 99%
“…The first layer, as presented in our previous work [4], represents the management layer in a cloud computing deployment. All the modules that are responsible with all cloud specific operations can be found at this level, together with the forensic targeted ones, such as "Cloud Forensic Module".…”
Section: Cloud Logging Architecturementioning
confidence: 99%
“…In our previous research [10] we have also focused on choosing a proper data representation format that will be used between the modules of our framework and between the modules and the central forensic processing core. In the next paragraphs we present a brief comparison of two existing proposals in this directions, that are applicable in our context.…”
Section: Related Workmentioning
confidence: 99%
“…The application discussed in this paper will be based on emulator VMware (a software which provide cloud and virtualization services.) [3] The paper also stipulates the requirement of all the clients connected to the server in private cloud setup like static IP address and monitory configuration of the system. The flow of the application goes as below: The proposed technology is discussed on the basis of existing Case studies as mentioned above.…”
Section: Proposed Cloud Virtualized System Architecture and Implmentioning
confidence: 99%