PROJECT TITLE :

A Log-based Approach to Make Digital Forensics Easier on Cloud Computing - 2013

ABSTRACT:

Cloud Computing is getting more and more attention from the information and Communication technologies industry recently. Almost all the leading companies of the information area show their interesting and efforts on Cloud Computing and release services about Cloud Computing in succession. But if want to make it go further, we should pay more effort on security issues. Especially, the Internet environment now has become more and more unsecure. With the popularization of computers and intelligent devices, the number of crime on them has increased rapidly in last decades, and will be quicker on the Cloud Computing environment in future. No wall is wall in the world. We should enhance the Cloud Computing not only at the aspect of precaution, but also at the aspect of dealing with the security events to defend it from crime activities. In this paper, I propose a approach which using logs model to building a forensic-friendly system. Using this model we can quickly gather information from Cloud Computing for some kinds of forensic purpose. And this will decrease the complexity of those kinds of forensics.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : A Patient-Centric Healthcare Framework Reference Architecture for Better Semantic Interoperability based on Blockchain, Cloud, and IoT ABSTRACT: The application-centric perspective gives rise to the distributed
PROJECT TITLE : Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks - 2014 ABSTRACT: Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective
PROJECT TITLE : On the Delay Advantage of Coding in Packet Erasure Networks - 2014 ABSTRACT: We consider the delay of network coding compared to routing with retransmissions in packet erasure networks with probabilistic erasures.
PROJECT TITLE : Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks - 2014 ABSTRACT: Message authentication is one of the most effective ways to thwart unauthorized and corrupted messages from being
PROJECT TITLE : Cross-Layer Approach for Minimizing Routing Disruption in IP Networks - 2014 ABSTRACT: Backup paths are widely used in IP networks to protect IP links from failures. However, existing solutions such as the commonly

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry