Digital Forensics in Distributed Environment

Digital Forensics in Distributed Environment

Asha Joseph, K. John Singh
Copyright: © 2019 |Pages: 21
ISBN13: 9781522581765|ISBN10: 1522581766|EISBN13: 9781522581772
DOI: 10.4018/978-1-5225-8176-5.ch059
Cite Chapter Cite Chapter

MLA

Joseph, Asha, and K. John Singh. "Digital Forensics in Distributed Environment." Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 1157-1177. https://doi.org/10.4018/978-1-5225-8176-5.ch059

APA

Joseph, A. & Singh, K. J. (2019). Digital Forensics in Distributed Environment. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 1157-1177). IGI Global. https://doi.org/10.4018/978-1-5225-8176-5.ch059

Chicago

Joseph, Asha, and K. John Singh. "Digital Forensics in Distributed Environment." In Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1157-1177. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8176-5.ch059

Export Reference

Mendeley
Favorite

Abstract

This chapter is about an ongoing implementation of a digital forensic framework that could be used with standalone systems as well as in distributed environments, including cloud systems. It is oriented towards combining concepts of cyber forensics and security frameworks in operating systems. The framework consists of kernel mechanisms for data and event monitoring. The system monitoring is done in kernel mode by various kernel modules and forensic model mapping is done in user mode using the data collected by those kernel modules. Further, the authors propose a crime model mapping mechanism that makes use of rule sets that are derived from common cyber/digital crime patterns. The decision-making algorithm can be easily extended from a node in a computing cluster, to a cloud. The authors discuss the challenges to digital forensics in distributed environment and cloud extensions and provide some case studies where the proposed framework is applied.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.