Abstract

Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.

Highlights

  • In the recent past, cloud computing has experienced phenomenal growth for IoT (Internet of Things)

  • The hypervisor and desktop virtualization solution comprising each virtual desktop infrastructure (VDI) differ, a survey revealed that the configuration methods are very similar [15,16,17] (Table 2)

  • In VDI, user data are stored in the central storage for virtual machines

Read more

Summary

Introduction

Cloud computing has experienced phenomenal growth for IoT (Internet of Things). To offer IoT services, many companies have managed to reduce costs and enhance the efficiency of their servers by adopting a virtual desktop infrastructure (VDI) which is classified into private cloud computing. Private cloud computing involves the use of virtualization technology of cloud servers. Resources such as CPU, RAM, and server storage are shared. Dykstra and Sherman researched a forensic collection method for infrastructure-as-a-service cloud computing [3]. To the best of our knowledge, research on digital forensic investigation (DFI) for a complete VDI has yet to be accomplished. Other research into digital forensics for cloud computing tends to focus on concepts or processes for general investigation and evidence collection.

Virtual Desktop Infrastructure
DFI Method for VDI
Method
Verification of Acquisition Data Integrity
Result
Reliability Verification of Forensic Tools for Virtual Machine Data
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call