Abstract
The use of cloud applications introduces new challenges to information system’s security. The idea of applications accessible from multiple devices and hosted or provided by third-party organisations brings new complications to IT security. In situations where organisations are embracing Bring Your Own Applications (BYOA) and where they allow use of free to public cloud applications within their networks, it is important for IT security experts to consider how to secure their BYOA environments and also monitor how these applications are used and the flow of information. The aim of this research was to develop a digital forensics-based solution for securing BYOA cloud environment. This solution can be used to improve security in an organisation implementing BYOA. The research focuses on free to public cloud applications, whereby security challenges are identified and security measures proposed. The security measures are enforced through the development of a customized solution. The solution has been developed using rapid application development (RAD) system methodology. Using Geany editor and Python programming language, the prototype developed relies on digital forensics artefacts to gather information about the usage of BYOAs. The solution captures digital forensics artefacts and stores them into a database as logs of the activity on Google Drive application. The solution demonstrates how digital forensics artefacts can be used to enhance security in a BYOA environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
M. Rouse, in Bring Your Own Apps (BYOA). Retrieved April 02, 2017, from TechTarget (2008). http://searchsecurity.techtarget.com/definition/bring-your-own-apps-BYOA
Comcast Business View, in BYOD/BYOA: A Growing, Applicable Trend. Retrieved April 05, 2017, from INC (2016). http://www.inc.com/comcast/byod-byoa-a-growing-applicable-trend.html
R. Patel, Enterprise Mobility Strategy & Solutions. Partridge (2014)
P.M. Grance, The NIST Definition of Cloud Computing (National Institute of Standards and Technology Laboratory, 2009)
J. Green, Cyber Security: An Introduction for Non-Technical Managers (Routledge, London, 2015)
W. Akpose, Cloud in the horizon: Opportunities and challenges for enterprises in the cloud economy. 6igma Associates (2014)
M. Mordhorst, How to help enterprises going mobile. Anchor Academic (2014)
R. Walters. Bringing IT out of the shadows. Netw. Secur. 1–20 (2013)
Acknowledgements
We thank all the authors, reviewers, editors-in-chief and participants for the great work. We thank the Strathmore University Institutional Ethics Review Committee (SU-IERC) for the ethical clearance to undertake this work. As required, all participants in this research duly consented before they could participate.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kasamani, B.S., Litunya, D. (2020). Activity Logging in a Bring Your Own Application Environment for Digital Forensics. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Fourth International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, vol 1041. Springer, Singapore. https://doi.org/10.1007/978-981-15-0637-6_20
Download citation
DOI: https://doi.org/10.1007/978-981-15-0637-6_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0636-9
Online ISBN: 978-981-15-0637-6
eBook Packages: EngineeringEngineering (R0)