International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 8 - Issue 11, November 2019 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

Digital Forensic Static Acquisition Analysis For Cloud Environments

[Full Text]



Harris Simaremare, Reza Tanujiwa Putra, Rahmad Abdillah



Cloud Environment, Digital Forensic, Evidence, Forensic tools, Recovery, Static Acquisition, Virtualization.



The application of digital forensic static acquisition on cloud environment was successfully built on Proxmox. It was used for acquisition and examine deleted digital evidence. The examination results yields that the digital evidence produce from the acquisition procedures was readable by the forensic software. Our results also show that the acquisition process runs only about 5 minutes which is much faster than other acquisition tools which was 39 minutes. Certainly, this result supported by automatic system can enhance the digital forensic performance



[1] B. Hu, N. Li, Z. Liu, M. Li, and C. Liu, “A Proactive Forensics Approach for Virtual Machines via Dynamic and Static Analysis,” in 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2016, pp. 514–521.
[2] R. Di Pietro and F. Lombardi, “Virtualization Technologies and Cloud Security: Advantages, Issues, and Perspectives,” vol. 11170, Springer International Publishing, 2018, pp. 166–185.
[3] S. Dija, T. R. Deepthi, C. Balan, and K. L. Thomas, “Towards Retrieving Live Forensic Artifacts in Offline Forensics,” 2012, pp. 225–233.
[4] D. Sudyana, B. Sugiantoro, and A. Luthfi, “Instrumen Evaluasi Framework Investigasi Forensika Digital Menggunakan SNI 27037:2014,” J. Inform. Sunan Kalijaga, vol. 1, no. 2, pp. 75–83, 2016.
[5] A. Huseinovic and S. Mrdovic, “Comparison of computer forensics investigation models for cloud environment,” in 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2018, pp. 0850–0853.
[6] N. D. W. Cahyani, B. Martini, K.-K. R. Choo, and A. M. N. Al-Azhar, “Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study,” Concurr. Comput. Pract. Exp., vol. 29, no. 14, p. e3855, Jul. 2017.
[7] M. Yu, Z. Qi, Q. Lin, X. Zhong, B. Li, and H. Guan, “Vis: Virtualization enhanced live forensics acquisition for native system,” Digit. Investig., vol. 9, no. 1, pp. 22–33, Jun. 2012.
[8] M. Rafique and M. N. A. Khan, “Exploring Static and Live Digital Forensics: Methods, Practices and Tools,” Int. J. Sci. Eng. Res., vol. 4, no. 10, pp. 1048–1056, 2013.
[9] Lei Zhang, Dong Zhang, and Lianhai Wang, “Live digital forensics in a virtual machine,” in 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010, vol. 4, no. Iccasm, pp. V4-328-V4-332.
[10] J. Xiao, L. Lu, H. Wang, and X. Zhu, “HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code,” in 2016 IEEE International Conference on Autonomic Computing (ICAC), 2016, pp. 127–136.
[11] E. Wahyudi, I. Riadi, and Y. Pray, “Virtual Machine Forensic Analysis And Recovery Method For Recovery And Analysis Digital Evidence,” Int. J. Comput. Sci. Inf. Secur., vol. 16, no. 2, pp. 1–7, 2018.
[12] F. Albanna and I. Riadi, “Forensic Analysis of Frozen Hard Drive Using Static Forensics Method,” Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 1, 2017.
[13] A. Prayogo, I. Riadi, and A. Luthfi, “Mobile Forensics Development of Mobile Banking Application using Static Forensic,” Int. J. Comput. Appl., vol. 160, no. 1, pp. 5–10, Feb. 2017.
[14] I. Riadi, R. Umar, and I. M. Nasrulloh, “Experimental Investigation of Frozen Solid State Drive on Digital Evidence with Static Forensic Methods,” Lontar Komput. J. Ilm. Teknol. Inf., pp. 169–181, 2018.