{"title":"Implementing an Authentication Mechanism for Machine Deletion on the Cloud","authors":"P. Dubey, Vineeta Tiwari, Shweta A Chawla","doi":"10.1145/2979779.2979878","DOIUrl":null,"url":null,"abstract":"Digital Investigation on the cloud platform is a challenging task. In the Virtual Scenario, Virtual Machines contain evidences. If once VMDK (Virtual Machine Disk file) is destroyed (deleted), it is impossible to recover your VM. At present there does not exist any mechanism that can recover a destroyed VM again which is the flaw in VM itself. All the activities on the VM is logged in VM, whereas activities of CSP (Cloud Service Provider) is logged on the server. So even if someone deleted the VM, all the evidences will be lost. This creates a disaster for the user and acts as a barrier for a forensic investigator to dig out the sensitive data of user that was stored in the Virtual Machine sometime. Thus, through this paper, we explore the existing mechanisms and challenges in the current cloud scenario and implement a mechanism to prevent the unauthorized deletion of the Virtual Machines.","PeriodicalId":298730,"journal":{"name":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the International Conference on Advances in Information Communication Technology & Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2979779.2979878","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Digital Investigation on the cloud platform is a challenging task. In the Virtual Scenario, Virtual Machines contain evidences. If once VMDK (Virtual Machine Disk file) is destroyed (deleted), it is impossible to recover your VM. At present there does not exist any mechanism that can recover a destroyed VM again which is the flaw in VM itself. All the activities on the VM is logged in VM, whereas activities of CSP (Cloud Service Provider) is logged on the server. So even if someone deleted the VM, all the evidences will be lost. This creates a disaster for the user and acts as a barrier for a forensic investigator to dig out the sensitive data of user that was stored in the Virtual Machine sometime. Thus, through this paper, we explore the existing mechanisms and challenges in the current cloud scenario and implement a mechanism to prevent the unauthorized deletion of the Virtual Machines.