Digital Evidence Acquisition System on IAAS Cloud Computing Model using Live Forensic Method
(1) STMIK Amik Riau
(2) STMIK Amik Riau
Abstract
Keywords
Full Text:
PDFReferences
S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, “Cloud computing — The business perspective,†Decis. Support Syst., vol. 51, no. 1, pp. 176–189, 2011.
L. Columbus, “Roundup Of Cloud Computing Forecasts,†Forbes, 05-Oct-2017.
L. Malhotra, D. Agarwal, and A. Jaiswal, “Virtualization in Cloud Computing,†Inf. Technol. Softw. Eng., vol. 4, no. 2, pp. 2–4, 2014.
S. Alqahtany and C. Reich, “A Forensic Acquisition and Analysis System for IaaS : Architectural Model and Experiment,†pp. 345–354, 2016.
I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,†Sci. J. Informatics, vol. 5, no. 2, pp. 235–247, 2018.
D. Sudyana, Y. Prayudi, and B. Sugiantoro, “Analysis and Evaluation Digital Forensic Investigation Framework Using ISO 27037 : 2012,†Int. J. Cyber-Security Digit. Forensics, vol. 8, no. January, pp. 1–14, 2019.
Badan Standarisasi Nasional, SNI 27037:2014 tentang Teknologi Informasi - Teknik Keamanan - Pedoman Identifikasi, pengumpulan, Akuisisi, dan Preservasi Bukti Digital. Jakarta, 2014.
J. Dykstra and A. T. Sherman, “Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing : Exploring and Evaluating Tools , Trust , and Techniques,†Digit. Investig., no. Vm, 2012.
R. Poisel, E. Malzer, and S. Tjoa, “Evidence and cloud computing: The virtual machine introspection approach,†J. Wirel. Mob. Networks, Ubiquitous Comput. Dependable Appl., vol. 4, no. 1, pp. 135–152, 2013.
P. Digambar, “A Novel Digital Forensic Framework for Cloud Computing Environment,†BIRLA INSTITUTE OF TECHNOLOGY AND SCIENCE, 2015.
S. Lim, B. Yoo, J. Park, K. Byun, and S. Lee, “A research on the investigation method of digital forensics for a VMware Workstation’s virtual machine,†Math. Comput. Model., vol. 55, no. 1–2, pp. 151–160, 2012.
E. Wahyudi, I. Riadi, and Y. Prayudi, “Virtual Machine Forensic Analysis And Recovery Method For Recovery And Analysis Digital Evidence,†Int. J. Comput. Sci. Inf. Secur., vol. 16, no. 2, pp. 1–7, 2018.
M. Rafique and M. N. A. Khan, “Exploring Static and Live Digital Forensics: Methods, Practices and Tools,†Int. J. Sci. Eng. Res., vol. 4, no. 10, pp. 1048–1056, 2013.
W. Ahmed, Mastering Proxmox - Second Edition, 2nd ed. Packt Publishing, 2016.
Refbacks
Scientific Journal of Informatics (SJI)
p-ISSN 2407-7658 | e-ISSN 2460-0040
Published By Department of Computer Science Universitas Negeri Semarang
Website: https://journal.unnes.ac.id/nju/index.php/sji
Email: [email protected]
This work is licensed under a Creative Commons Attribution 4.0 International License.