Show simple item record

dc.contributor.authorDalezios, N
dc.contributor.authorShiaeles, S
dc.contributor.authorKolokotronis, N
dc.contributor.authorGhita, B
dc.date.accessioned2020-10-26T19:24:06Z
dc.date.available2020-10-26T19:24:06Z
dc.date.issued2020-10
dc.identifier.issn2214-2126
dc.identifier.issn2214-2134
dc.identifier.other102555
dc.identifier.urihttp://hdl.handle.net/10026.1/16600
dc.description.abstract

Cloud computing is an important step in our era, delivering many advantages in business and our daily life. However, as every new technology, various challenges are brought into light with one of them being the misuse of Cloud computing environments for criminal activities. As such, Cloud service providers have to establish adequate forensic capabilities in order to support forensics investigations in the event of illegal activities in the cloud. In order to help forensics investigations, this paper deals with log format unification in cloud platforms using Distributed Management Task Force's (DMTF) Cloud Auditing Data Federation (CADF) standard. CADF event logging is utilised in the widely used OpenStack, and we have modified the Apache CloudStack platform to become forensically sound. Furthermore, we investigated the existing CloudStack platform along with the proposed CADF event model implemented, with regards to the principles of the Association of Chief Police Officers (ACPO) on handling digital evidence. The results are provided in this paper as well as an automated parsing tool/CADF event consumer, named C.Lo.D, which is freely available and can be downloaded from Github.

dc.format.extent102555-102555
dc.languageen
dc.language.isoen
dc.publisherElsevier BV
dc.subjectCloud computing
dc.subjectComputer crime
dc.subjectForensics
dc.subjectCloud Auditing Data Federation
dc.subjectCADF
dc.subjectCloudStack
dc.titleDigital forensics cloud log unification: Implementing CADF in Apache CloudStack
dc.typejournal-article
dc.typeJournal Article
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000572992000002&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.volume54
plymouth.publication-statusPublished
plymouth.journalJournal of Information Security and Applications
dc.identifier.doi10.1016/j.jisa.2020.102555
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.identifier.eissn2214-2134
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1016/j.jisa.2020.102555
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV