Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools |
Kim, Deunghwa
(Center for Information Security Technologies(CIST), Korea University)
Jang, Sanghee (Center for Information Security Technologies(CIST), Korea University) Park, Jungheum (Center for Information Security Technologies(CIST), Korea University) Kang, Cheulhoon (Digital Forensic Center, Supreme Prosecutors' Office) Lee, Sangjin (Center for Information Security Technologies(CIST), Korea University) |
1 | Citrix, http://citrix.com |
2 | 정일훈, 오정훈, 박정흠, 이상진, "IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구," 정보보호학회논문지, 21(6), pp. 55-65, 2011년 12월. |
3 | 강성림, 박정흠, 이상진, "클라이언트 관점의 SaaS 사용 흔적 분석," 정보처리학회논문지, 19(1), pp. 1-8, 2012년 2월. |
4 | Mark Taylor, John Haggerty, David Gresty, and David Lamb, "Forensic Investigation of Cloud Computing Systems," Network Security, March 2011. |
5 | Junghoon Oh, Seungbong Lee, and Sangjin Lee, "Advanced evidence collection and analysis of web browser activity," DFRWS, pp. 62-70, August 2011. |
6 | Dominik Birk, "Technical Challenges of Forensic Investigations in Cloud Computing Environments," Workshop on Cryptography and Security in Clouds, January 2011. |
7 | Faith Shimba, "Cloud Computing : Strategies for Cloud Computing Adoption," Dublin Institute of Technology, pp. 1-117, September 2010. |
8 | Cyril Onwubiko, "Security Issues to Cloud Computing," Computer Communications and Networks, pp. 271-288, July 2009. |