Computational & Technology Resources
an online resource for computational,
engineering & technology publications
Civil-Comp Proceedings
ISSN 1759-3433
CCP: 107
PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, GRID AND CLOUD COMPUTING FOR ENGINEERING
Edited by:
Paper 21

Cloud Computing Virtualization and Cyber Attacks: Evidence Centralization

Y. Turel and R. Kotowski

Department of Applied Informatics, Polish-Japanese Academy of Information Technology, Warsaw, Poland

Full Bibliographic Reference for this paper
Y. Turel, R. Kotowski, "Cloud Computing Virtualization and Cyber Attacks: Evidence Centralization", in , (Editors), "Proceedings of the Fourth International Conference on Parallel, Distributed, Grid and Cloud Computing for Engineering", Civil-Comp Press, Stirlingshire, UK, Paper 21, 2015. doi:10.4203/ccp.107.21
Keywords: cloud computing, digital forensics, centralization, virtualization, cyberattacks, evidence data.

Summary
Cloud computing is the on-line resource management service which can be used on the pay-per-use base. Despite many advantages for the end-users, it has weaknesses, for example it is vulnerable against cyber-attacks. Cloud computing has a complex nature and it works on a number of physical servers running multiple virtual machines. A large number of log files from multiple servers and layers poses risks in cloud computing operations. Collecting digital evidence after the malicious attacks is important to understand and assess the criminal activity. In this paper the importance of centralization in the cloud computing virtual environment against the cyberattacks is proposed and the virtualization, threats and centralized logging mechanism approach is introduced and discussed.

purchase the full-text of this paper (price £20)

go to the previous paper
go to the next paper
return to the table of contents
return to the book description
purchase this book (price £45 +P&P)