首页    期刊浏览 2024年11月10日 星期日
登录注册

文章基本信息

  • 标题:Investigation on the Services of Private Cloud Computing by Using ADAM Method
  • 其他标题:Investigation on the Services of Private Cloud Computing by Using ADAM Method
  • 本地全文:下载
  • 作者:Nur Widiyasono ; Imam Riadi ; Ahmad Luthfie
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2016
  • 卷号:6
  • 期号:5
  • 页码:2387-2395
  • DOI:10.11591/ijece.v6i5.pp2387-2395
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:Cloud services are offered by many cloud service providers, but in for large companies generally are build by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.
  • 其他摘要:Cloud services are offered by many cloud service providers, but in for large companies generally are build by a private cloud computing. In cloud systems of abuse it can be done by internal users or due to misconfiguration or may also refer to weaknesses in the system. This study evaluated the ADAM method (Advanced Data Acquisition Model) and tested the case schemes which are being carried out in the laboratory simulation of the process in order to obtain forensic evidence of digital data on private cloud computing services. Referring to the results of the investigation process by using ADAM Method, it can be verified that there are several parameters of the success investigation including the structure of files, files, time stamp, mac-address, IP address, username password, and the data from a server both from the desktop PC or smartphone, therefore the investigation by using ADAM can be succesed properly and correctly. Another contribution of this study was to identify the weaknesses of the service system that used owncloud in users list of the the same group can change another’s user’s passwod.
  • 关键词:Computer and Informatics; Telecommunication and Information Technology;ADAM; Cloud; Evaluation; Forensic; Investigation
国家哲学社会科学文献中心版权所有