Full Text

Turn on search term navigation

Copyright © 2015 Doowon Jeong et al. Doowon Jeong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.

Details

Title
Investigation Methodology of a Virtual Desktop Infrastructure for IoT
Author
Jeong, Doowon; Park, Jungheum; Lee, Sangjin; Kang, Chulhoon
Publication year
2015
Publication date
2015
Publisher
John Wiley & Sons, Inc.
ISSN
1110757X
e-ISSN
16870042
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
1669846474
Copyright
Copyright © 2015 Doowon Jeong et al. Doowon Jeong et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.