Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.2.223

Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools  

Kim, Deunghwa (Center for Information Security Technologies(CIST), Korea University)
Jang, Sanghee (Center for Information Security Technologies(CIST), Korea University)
Park, Jungheum (Center for Information Security Technologies(CIST), Korea University)
Kang, Cheulhoon (Digital Forensic Center, Supreme Prosecutors' Office)
Lee, Sangjin (Center for Information Security Technologies(CIST), Korea University)
Abstract
Recently, a large number of corporations are adopting cloud solution in order to reduce IT-related costs. By the way, Digital Trace should have admissibility to be accepted as digital evidence in court, and integrity is one of the factors for admissibility. In this context, this research implemented integrity verification test to VM Data which was collected by well-known private cloud solutions such as Citrix, VMware, and MS Hyper-V. This paper suggests the effective way to verify integrity of VM data collected in private cloud computing environment based on the experiment and introduces the error that EnCase fails to mount VHD (Virtual Hard Disk) files properly.
Keywords
Digital Forensics; Cloud Forensics; Citrix; VM Ware; Hyper-V; Data Export;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Citrix, http://citrix.com
2 정일훈, 오정훈, 박정흠, 이상진, "IaaS 유형의 클라우드 컴퓨팅 서비스에 대한 디지털 포렌식 연구," 정보보호학회논문지, 21(6), pp. 55-65, 2011년 12월.
3 강성림, 박정흠, 이상진, "클라이언트 관점의 SaaS 사용 흔적 분석," 정보처리학회논문지, 19(1), pp. 1-8, 2012년 2월.
4 Mark Taylor, John Haggerty, David Gresty, and David Lamb, "Forensic Investigation of Cloud Computing Systems," Network Security, March 2011.
5 Junghoon Oh, Seungbong Lee, and Sangjin Lee, "Advanced evidence collection and analysis of web browser activity," DFRWS, pp. 62-70, August 2011.
6 Dominik Birk, "Technical Challenges of Forensic Investigations in Cloud Computing Environments," Workshop on Cryptography and Security in Clouds, January 2011.
7 Faith Shimba, "Cloud Computing : Strategies for Cloud Computing Adoption," Dublin Institute of Technology, pp. 1-117, September 2010.
8 Cyril Onwubiko, "Security Issues to Cloud Computing," Computer Communications and Networks, pp. 271-288, July 2009.