Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2015, Article ID 689870, 10 pages
http://dx.doi.org/10.1155/2015/689870
Research Article

Investigation Methodology of a Virtual Desktop Infrastructure for IoT

1Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of Korea
2Supreme Prosecutors’ Office, Seocho-dong, Seocho-gu, Seoul 137-730, Republic of Korea

Received 13 March 2014; Accepted 31 July 2014

Academic Editor: Young-Sik Jeong

Copyright © 2015 Doowon Jeong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. Taylor, J. Haggerty, D. Gresty, and D. Lamb, “Forensic investigation of cloud computing systems,” Network Security, vol. 2011, no. 3, pp. 4–10, 2011. View at Publisher · View at Google Scholar · View at Scopus
  2. H. Chung, J. Park, S. Lee, and C. Kang, “Digital forensic investigation of cloud storage services,” Digital Investigation, vol. 9, no. 2, pp. 81–95, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Dykstra and A. T. Sherman, “Design and implementation of FROST: digital forensic tools for the OpenStack cloud computing platform,” Digital Investigation, vol. 10, pp. S87–S95, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. A. Huth and J. Cebula, The Basics of Cloud Computing, Burlington, 2011.
  5. P. Mell and T. Grance, “The NIST definition of cloud computing,” NIST Special Publication 800–145, 2011. View at Google Scholar
  6. Y. Pan and J. Zhang, “Parallel programming on cloud computing platforms,” Journal of Convergence, vol. 3, pp. 23–28, 2012. View at Google Scholar
  7. S. Biggs and S. Vidalis, “Cloud computing: the impact on digital forensic investigations,” Internet Technology and Secured Transactions, pp. 1–6, 2009. View at Google Scholar
  8. B. Martini and K.-K. R. Choo, “An integrated conceptual digital forensic framework for cloud computing,” Digital Investigation, vol. 9, no. 2, pp. 71–80, 2012. View at Publisher · View at Google Scholar · View at Scopus
  9. M. Taylor, J. Haggerty, D. Gresty, and R. Hegarty, “Digital evidence in cloud computing systems,” Computer Law & Security Review, vol. 26, no. 3, pp. 304–308, 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. T. Teraoka, “Organization and exploration of heterogeneous personal data collected in daily life,” Human-Centric Computing and Information Sciences, vol. 2, article 1, 2012. View at Publisher · View at Google Scholar
  11. S. Silas, K. Ezra, and E. B. Rajsingh, “A novel fault tolerant service selection framework for pervasive computing,” Human-Centric Computing and Information Sciences, vol. 2, pp. 1–14, 2012. View at Google Scholar
  12. T. J. Bittman, Top five private cloud computing trends, 2012, http://blogs.gartner.com/thomas_bittman/2012/03/22/top-five-private-cloud-computing-trends-2012/.
  13. S. Thorpe, “Virtual machine history model framework for a data cloud digital investigation,” Journal of Convergence, vol. 3, 2012. View at Google Scholar
  14. X. Xie, H. Jiang, H. Jin, W. Cao, P. Yuan, and L. T. Yang, “Metis: a profiling toolkit based on the virtualization of hardware performance counters,” Human-Centric Computing and Information Sciences, vol. 2, pp. 1–15, 2012. View at Publisher · View at Google Scholar
  15. EMC White Paper, “Sizing EMC VNX Series for VDI workload,” EMC, 2012.
  16. Citrix, “XenServer Citrix eDocs,” 2012, http://support.citrix.com/proddocs/topic/xenserver/xs-wrapper.html.
  17. Vmware, “VMware View architecture planning,” 2012, http://pubs.vmware.com/view-50/topic/com.vmware.ICbase/PDF/view-50-architecture-planning.pdf.
  18. J. Dykstra and D. Riehl, “Forensic collection of electronic evidence from infrastructure-as-a-service cloud computing,” Richmond Journal of Law and Technology, vol. 19, no. 1, pp. 1–47, 2012. View at Google Scholar