Computational & Technology Resources
an online resource for computational,
engineering & technology publications |
|
Civil-Comp Proceedings
ISSN 1759-3433 CCP: 107
PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED, GRID AND CLOUD COMPUTING FOR ENGINEERING Edited by:
Paper 21
Cloud Computing Virtualization and Cyber Attacks: Evidence Centralization Y. Turel and R. Kotowski
Department of Applied Informatics, Polish-Japanese Academy of Information Technology, Warsaw, Poland Y. Turel, R. Kotowski, "Cloud Computing Virtualization and Cyber Attacks: Evidence Centralization", in , (Editors), "Proceedings of the Fourth International Conference on Parallel, Distributed, Grid and Cloud Computing for Engineering", Civil-Comp Press, Stirlingshire, UK, Paper 21, 2015. doi:10.4203/ccp.107.21
Keywords: cloud computing, digital forensics, centralization, virtualization, cyberattacks, evidence data.
Summary
Cloud computing is the on-line resource management service which can be used on
the pay-per-use base. Despite many advantages for the end-users, it has weaknesses,
for example it is vulnerable against cyber-attacks. Cloud computing has a complex
nature and it works on a number of physical servers running multiple virtual machines.
A large number of log files from multiple servers and layers poses risks in
cloud computing operations. Collecting digital evidence after the malicious attacks
is important to understand and assess the criminal activity. In this paper the importance
of centralization in the cloud computing virtual environment against the cyberattacks
is proposed and the virtualization, threats and centralized logging mechanism
approach is introduced and discussed.
purchase the full-text of this paper (price £20)
go to the previous paper |
|