Abstract

Cloud Computing is a technological development that has been warmly discussed in recent years and has seen significant increases in usage, especially on the IAAS Cloud Computing model. The high rate of development of IAAS Cloud Computing model is in line with the high number of crimes involving IAAS Cloud Computing model on server virtualization. When a computer crime occurs and a digital forensic investigation will be carried out to uncover the case, it raises issues related to the acquisition of digital evidence. Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. Therefore, research to make the acquisition system of server virtualization is needed. The focus in this research is to make system acquisition in server virtualization Proxmox using the live forensic method to produce a system that can acquire virtualization without disrupting the overall data server and in accordance with the principle of digital forensics. The resulting acquisition system can be a reference for investigators to investigate the IAAS Cloud Computing model on Proxmox virtualization and facilitate the investigator's work in the use of the system because the investigator simply chooses which virtual operating system to acquire, after which the system will work on its own the acquisition.

Highlights

  • Cloud Computing is a technological development that is quite warmly discussed in recent years

  • When a cybercrime in Cloud Computing takes place, it used a process with a scientific method known as digital forensics to reveal evidence of its crime [6]

  • The Acquisition System has been successfully used to carry out acquisition procedures on server virtualization Proxmox

Read more

Summary

INTRODUCTION

Cloud Computing is a technological development that is quite warmly discussed in recent years. When a cybercrime in Cloud Computing takes place, it used a process with a scientific method known as digital forensics to reveal evidence of its crime [6]. There are already several researchers who conduct research related to the acquisition process of the IAAS, including research conducted by [8] where they explore the acquisition techniques and evaluate tools against Amazon EC2 which is a server virtualization service provider. The system only needs to be copied into the Proxmox Server and executed immediately This system will have several menu options such as menus for mounting USB, menus to see a list of existing virtual operating systems, and a core menu, namely the acquisition menu.

METHODS
Case Studies and Simulations
Analysis of Acquisition Techniques
Design of Acquisition System
System Testing
Examination and Analysis of Digital Evidence
RESULT
Examination and Analysis of Evidence
Deleted Data
Findings
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call