Skip to main content

VMSSS: A Proposed Model for Cloud Forensic in Cloud Computing Using VM Snapshot Server

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 816))

Abstract

Cloud computing besides being used in industries it is also used in academics; existing cloud computing architectures do not support cloud forensic investigations and are also not forensic ready to a remarkable extent, and also the present tools which are being used in the cloud forensics do not support the elastic nature of cloud. We explore and expose several issues related to cloud forensics in cloud computing by keeping an eye on the concepts of cloud computing which are being developed and are utilized along with latest technologies and also the investments which are being made on cloud computing. Latest developments in technologies have created certain challenges which are emerging and have exposed that cloud has the potential to handle most computing technologies which are being transformative, one such challenging concepts which have been increasing its wait is cloud forensics. In this paper we have traced out the concepts which revolves around cloud forensics and here we propose a model which includes a VM SnapShot Server which continuously stores the snapshots of the cloud service provider and certain servers involved in computing moment by moment so that this would be useful for any digital crime related to cloud, as this plays a key role in identifying the correct cause of the mischief task which resulted in the loss or damage of the original data; this is also helpful during the cases where either the cloud service provider or the suspect gives an incorrect information during the investigation carried out in digital crime; this model also has certain advantages over the present existing models. When certain new activities such as uploading a malware in the cloud, downloading more files then the permissible number, more access from a location, cracking the saved passwords, launching and deleting malicious files, creating corrupted files on the sensitive data stored in the cloud such kind of things can also be traced out easily.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. http://cloud.cioreview.com/news/cloud-market-to-reach-121-billion-by-2015-nid-866-cid-17.html

  2. Dykstra, Sherman, A.T.: Acquiring forensic evidence from infrastructure-as-a-service cloud computing: exploring and evaluating tools

    Google Scholar 

  3. Ruan, K., Carthy, J.: Cloud computing reference architecture and its forensic implications: a preliminary analysis. In: Digital Forensics and Cyber Crime. Springer, pp. 1–21 (2013)

    Google Scholar 

  4. Martini, B., Choo, K.K.R.: An integrated conceptual digital forensic framework for cloud computing. Digital Invest. 9(2), 71–80 (2012)

    Article  Google Scholar 

  5. Ruan, K., Carthy, J., Kechadi, T., Crosbie, M.: Cloud forensics. In: Advances in Digital Forensics VII, vol. 361, no. IFIP Advances in Information and Communication Technology pp. 35–46 (2011)

    Chapter  Google Scholar 

  6. Harrison, K., Bordbar, B., Ali, S.T.T., Dalton, C.I., Norman, A.: A framework for detecting malware in cloud by identifying symptoms. In: Enterprise Distributed Object Computing Conference (EDOC), IEEE 16th International, pp. 164–172 (2012)

    Google Scholar 

  7. Wu, Z., Gianvecchio, S., Xie, M., Wang, H.: Mimimorphism: a new approach to binary code obfuscation. In: Proceedings of the 17th ACM conference on Computer and communications security. ACM, pp. 536–546 (2010)

    Google Scholar 

  8. Baltazar, J., Costoya, J., Flores, R.: The real face of koobface: the largest web 2.0 botnet explained. In: Trend Micro Research, vol. 5, no. 9, p. 10 (2009)

    Google Scholar 

  9. Falliere, N., Chien, E.: Zeus: king of the bots. In: Symantec Security Response, Technical Report 2009, available at: www.symantec.com/content/en/us/enterprise/media/securityresponse/whitepapers/zeuskingofbots.pdf

  10. Porras, P., Saidi, H., Yegneswaran, V.: Conficker c analysis. SRI International, Technical Report 2009, Accessed 13 Mar 2013

    Google Scholar 

  11. Citrix Systems, Xen Hypervisor, xen.org/products/xenhyp.html

    Google Scholar 

  12. Kaspersky: Gauss: abnormal distribution. Kaspersky Lab Global Research and Analysis Team, Technical Report, 2012, available at: www.securelist.com/en/downloads/vlpdfs/kaspersky-lab-gauss.pdf

  13. Symantec,“Infostealer.Banker.C,” www.symantec.com/securityresponse/writeup.jsp?docid = 2010-020216-0135-99

  14. Nelson, B.: Guide to computer forensics and investigations, 4, illustrated 3ed. Cengage Learning 2010, 42–48 (2010)

    Google Scholar 

  15. Arbone, M. et al.: Research in attacks, intrusions, and defenses. Lecture Notes in Computer Science. Springer, Berlin Heidelberg, vol. 7462, pp. 22–41

    Google Scholar 

  16. Butt, S. et al., (2012) Proceedings of the ACM Conference on Computer and Communications Security. Raleigh, North Carolina. ACM, Raleigh, New York, NY, pp. 253–264

    Google Scholar 

  17. Harrison, C. et al.: IEEE 11th International Conference on. IEEE, Liverpool, pp. 163–169 (2012)

    Google Scholar 

  18. Microsoft: Microsoft hyper -v homepage. http://www.microsoft.com/en-us/server-cloud/hyper-v-server/default.aspx (2012)

  19. Xen: Xen homepage. http://www.xen.org/. Accessed date 15 March 2013 (2012)

  20. Qemu: Qemu homepage. http://wiki.qemu.org/Main_Page (2012). Accessed date 15 Mar 2013

  21. Ware, V.M.: Vmware workstation overview. http://www.vmware.com/products/workstation/overview.html (2012). Accessed date 15 March 2013

  22. VM: Linux kvm homepage. http://www.linux-kvm.org/page/Main_Page (2012). Accessed date 15 Mar 2013

  23. Neugschwandtner, M., et al.: Detection of Intrusions and Malware, and Vulnerability Assessment, volume 6201 of Lecture Notes in Computer Science. Springer, Berlin Heidelberg pp. 41–60. ISBN 978-3-642-14214-7 (2010)

    Google Scholar 

  24. Jiang, X., et al.: Proceedings of the 14th ACM conference on Computer and communications security, CCS’07. ACM, New York, NY, USA. pp. 128–138. ISBN 978-1-59593-703-2. http://doi.acm (2007)

  25. Mohiddin, S.K. et al.: Proceedings of 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), A practical approach to overcome glitches in achieving high performance computing

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ch. Aparna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sharmila, S., Aparna, C. (2019). VMSSS: A Proposed Model for Cloud Forensic in Cloud Computing Using VM Snapshot Server. In: Bansal, J., Das, K., Nagar, A., Deep, K., Ojha, A. (eds) Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 816. Springer, Singapore. https://doi.org/10.1007/978-981-13-1592-3_38

Download citation

Publish with us

Policies and ethics