Skip to main content

Activity Logging in a Bring Your Own Application Environment for Digital Forensics

  • Conference paper
  • First Online:
  • 678 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1041))

Abstract

The use of cloud applications introduces new challenges to information system’s security. The idea of applications accessible from multiple devices and hosted or provided by third-party organisations brings new complications to IT security. In situations where organisations are embracing Bring Your Own Applications (BYOA) and where they allow use of free to public cloud applications within their networks, it is important for IT security experts to consider how to secure their BYOA environments and also monitor how these applications are used and the flow of information. The aim of this research was to develop a digital forensics-based solution for securing BYOA cloud environment. This solution can be used to improve security in an organisation implementing BYOA. The research focuses on free to public cloud applications, whereby security challenges are identified and security measures proposed. The security measures are enforced through the development of a customized solution. The solution has been developed using rapid application development (RAD) system methodology. Using Geany editor and Python programming language, the prototype developed relies on digital forensics artefacts to gather information about the usage of BYOAs. The solution captures digital forensics artefacts and stores them into a database as logs of the activity on Google Drive application. The solution demonstrates how digital forensics artefacts can be used to enhance security in a BYOA environment.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. M. Rouse, in Bring Your Own Apps (BYOA). Retrieved April 02, 2017, from TechTarget (2008). http://searchsecurity.techtarget.com/definition/bring-your-own-apps-BYOA

  2. Comcast Business View, in BYOD/BYOA: A Growing, Applicable Trend. Retrieved April 05, 2017, from INC (2016). http://www.inc.com/comcast/byod-byoa-a-growing-applicable-trend.html

  3. R. Patel, Enterprise Mobility Strategy & Solutions. Partridge (2014)

    Google Scholar 

  4. P.M. Grance, The NIST Definition of Cloud Computing (National Institute of Standards and Technology Laboratory, 2009)

    Google Scholar 

  5. J. Green, Cyber Security: An Introduction for Non-Technical Managers (Routledge, London, 2015)

    Google Scholar 

  6. W. Akpose, Cloud in the horizon: Opportunities and challenges for enterprises in the cloud economy. 6igma Associates (2014)

    Google Scholar 

  7. M. Mordhorst, How to help enterprises going mobile. Anchor Academic (2014)

    Google Scholar 

  8. R. Walters. Bringing IT out of the shadows. Netw. Secur. 1–20 (2013)

    Google Scholar 

Download references

Acknowledgements

We thank all the authors, reviewers, editors-in-chief and participants for the great work. We thank the Strathmore University Institutional Ethics Review Committee (SU-IERC) for the ethical clearance to undertake this work. As required, all participants in this research duly consented before they could participate.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bernard Shibwabo Kasamani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kasamani, B.S., Litunya, D. (2020). Activity Logging in a Bring Your Own Application Environment for Digital Forensics. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Fourth International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 1041. Springer, Singapore. https://doi.org/10.1007/978-981-15-0637-6_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0637-6_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0636-9

  • Online ISBN: 978-981-15-0637-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics