Abstract | ||
---|---|---|
The traditional digital forensic investigation process has always had a post-event driven focus. This process is perhaps too long for the cloud. This paper investigates how digital forensic readiness can be used to quicken and update the traditional digital forensic investigation process to better suit cloud computing environments. John Tans states that centralized logging is the key to efficient forensic strategies. The author proposes a model that considers centralised logging of all activities of all the participants within the cloud in preparation of an investigation. This approach will quicken the acquisition of evidential data when an investigation is required, allowing the investigator to start the analysis and examination almost immediately. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/ISSA.2013.6641055 | Johannesburg |
Keywords | Field | DocType |
cloud computing,digital forensics,centralized logging,cloud computing environments,digital forensic investigation process,digital forensic readiness,evidential data acquisition,AES,Cloud Computing,Cryptographic Hash Functions,Diffie-Hellman,Digital Forensic Investigation Process,Digital Forensic Readiness,Digital Forensics,Network Time Protocol,RSA,Remote and Centralized Logging,Windows Event Logs | Internet privacy,Digital forensics cloud computing,Digital forensics,Computer security,Computer science,Cloud computing | Conference |
Citations | PageRank | References |
5 | 0.43 | 5 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Philip M. Trenwith | 1 | 5 | 0.43 |
Hein S. Venter | 2 | 58 | 8.01 |