کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
448000 693519 2016 15 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
CURE—Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
CURE—Towards enforcing a reliable timeline for cloud forensics: Model, architecture, and experiments
چکیده انگلیسی


• Cloud time alteration attack scenarios, consequences, and countermeasures, have been surveyed.
• A novel cloud simulator has been designed, implemented, and released as open source.
• CURE architecture can detect Timeline of Events alterations to aid a forensic investigation process.
• A real-world deployment of CURE has been tested on a public cloud.
• Measured performance figures support CURE viability.

A malicious alteration of system-provided timeline can negatively affect the reliability of computer forensics. Indeed, detecting such changes and possibly reconstructing the correct timeline of events is of paramount importance for court admissibility and logical coherence of collected evidence. However, reconstructing the correct timeline for a set of network nodes can be difficult since an adversary has a wealth of opportunities to disrupt the timeline and to generate a fake one. This aspect is exacerbated in cloud computing, where host and guest machine-time can be manipulated in various ways by an adversary. Therefore, it is important to guarantee the integrity of the timeline of events for cloud host and guest nodes, or at least to ensure that timeline alterations do not go undetected. This paper provides several contributions. First, we survey the issues related to cloud machine-time reliability. Then, we introduce a novel architecture (CURE) aimed at providing timeline resilience to cloud nodes. Further, we implement the proposed framework and extensively test it on both a simulated environment and on a real cloud. We evaluate and discuss collected results showing the effectiveness of our proposal.

Figure optionsDownload as PowerPoint slide

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computer Communications - Volumes 91–92, 1 October 2016, Pages 29–43
نویسندگان
, , ,