Investigation Methodology of a Virtual Desktop Infrastructure for IoT

Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of thei...

Full description

Saved in:
Bibliographic Details
Main Authors: Doowon Jeong, Jungheum Park, Sangjin Lee, Chulhoon Kang
Format: Article
Language:English
Published: Wiley 2015-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2015/689870
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832554431583879168
author Doowon Jeong
Jungheum Park
Sangjin Lee
Chulhoon Kang
author_facet Doowon Jeong
Jungheum Park
Sangjin Lee
Chulhoon Kang
author_sort Doowon Jeong
collection DOAJ
description Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.
format Article
id doaj-art-7fd3c28d27434401ab3f09f6d3f0d614
institution Kabale University
issn 1110-757X
1687-0042
language English
publishDate 2015-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-7fd3c28d27434401ab3f09f6d3f0d6142025-02-03T05:51:36ZengWileyJournal of Applied Mathematics1110-757X1687-00422015-01-01201510.1155/2015/689870689870Investigation Methodology of a Virtual Desktop Infrastructure for IoTDoowon Jeong0Jungheum Park1Sangjin Lee2Chulhoon Kang3Center for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaCenter for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaCenter for Information Security Technologies (CIST), Korea University, Anam-dong, Seongbuk-gu, Seoul 136-713, Republic of KoreaSupreme Prosecutors’ Office, Seocho-dong, Seocho-gu, Seoul 137-730, Republic of KoreaCloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.http://dx.doi.org/10.1155/2015/689870
spellingShingle Doowon Jeong
Jungheum Park
Sangjin Lee
Chulhoon Kang
Investigation Methodology of a Virtual Desktop Infrastructure for IoT
Journal of Applied Mathematics
title Investigation Methodology of a Virtual Desktop Infrastructure for IoT
title_full Investigation Methodology of a Virtual Desktop Infrastructure for IoT
title_fullStr Investigation Methodology of a Virtual Desktop Infrastructure for IoT
title_full_unstemmed Investigation Methodology of a Virtual Desktop Infrastructure for IoT
title_short Investigation Methodology of a Virtual Desktop Infrastructure for IoT
title_sort investigation methodology of a virtual desktop infrastructure for iot
url http://dx.doi.org/10.1155/2015/689870
work_keys_str_mv AT doowonjeong investigationmethodologyofavirtualdesktopinfrastructureforiot
AT jungheumpark investigationmethodologyofavirtualdesktopinfrastructureforiot
AT sangjinlee investigationmethodologyofavirtualdesktopinfrastructureforiot
AT chulhoonkang investigationmethodologyofavirtualdesktopinfrastructureforiot