CFP last date
20 December 2024
Reseach Article

Data Acquisition on a Virtual Machine: Three Scenarios

by Saritha Narahari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 16
Year of Publication: 2018
Authors: Saritha Narahari
10.5120/ijca2018917760

Saritha Narahari . Data Acquisition on a Virtual Machine: Three Scenarios. International Journal of Computer Applications. 181, 16 ( Sep 2018), 19-30. DOI=10.5120/ijca2018917760

@article{ 10.5120/ijca2018917760,
author = { Saritha Narahari },
title = { Data Acquisition on a Virtual Machine: Three Scenarios },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2018 },
volume = { 181 },
number = { 16 },
month = { Sep },
year = { 2018 },
issn = { 0975-8887 },
pages = { 19-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number16/29906-2018917760/ },
doi = { 10.5120/ijca2018917760 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:06:09.253870+05:30
%A Saritha Narahari
%T Data Acquisition on a Virtual Machine: Three Scenarios
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 16
%P 19-30
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Virtual machine computing is becoming more and more prevalent. Companies are providing virtual desktops for their employees and using virtual machines to run server software. Additionally, the use of Infrastructure as a Service has placed virtual machines within the reach of even more people. Virtual machines can pose a challenge because of their transient nature. Also, the nature of how virtual machines store data could prove problematic.

References
  1. Digital Forensics on a Virtual Machine; University of Alabama website, undated; Juan Carlos Flores Cruz, Travis Atkinson http://atkison.cs.ua.edu/papers/ACMSE11_JF.pdf
  2. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques; Digital Investigation Volume 9, Supplement, August 2012, Pages S90-S98; Josiah Dykstra, Alan T.Sherman https://www.sciencedirect.com/science/article/pii/S1742287612000266
  3. Evolution of Traditional Digital Forensic in Virtualization; ACMSE '13 Proceedings of the 51st ACM Southeast Conference Article No. 30; Savannah, Georgia — April 04 - 06, 2013; Juan Carlos Flores Cruz, Travis Atkinson https://dl.acm.org/citation.cfm?id=2500078.
Index Terms

Computer Science
Information Sciences

Keywords

Data Acquisition Virtual Machine