Skip to main content
Log in

Event correlation in cloud: a forensic perspective

  • Published:
Computing Aims and scope Submit manuscript

Abstract

Forensic investigation in cloud computing systems faces various legal, technical and organizational challenges. In this work, we focus on the technical issues of cloud forensics, specifically event correlation—a technique used to expose the relation between two or more cloud events. Event correlation in cloud is relatively at its early stages. We categorize the cloud event correlation in to two stages. In the first stage, we consider the events from the perspective of single artifact and perform correlation (homogeneous correlation). In the second stage, we collect the events from multiple artifacts and then perform correlation (heterogeneous correlation). The proposed approach helps automate the detection of incidents from cloud evidences and also speedup the event interpretation process by the investigator.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  1. NIST (2014) NIST cloud computing forensic science challenges. [Online]. http://csrc.nist.gov/publications/drafts/nistir-8006/draft_nistir_8006

  2. Kliger S et al (1995) A coding approach to event correlation. Integr Netw Manag 95:266-277

    Article  Google Scholar 

  3. Gladyshev P, Patel A (2005) Formalising event time bounding in digital investigations. Int J Digit Evid 4(2):1-14

    Google Scholar 

  4. Kavulya SP et al (2012) Failure diagnosis of complex systems. Resilience assessment and evaluation of computing systems. Springer, Berlin

    Google Scholar 

  5. Dayan T (2012) Event correlation in cloud computing. US Patent Application 12/841,371

  6. Ficco M (2013) Security event correlation approach for cloud computing. Int J High Perform Comput Netw 1 7(3):173-185

    Article  Google Scholar 

  7. Bohra AEH, Chaudhary V (2010) VMeter: power modelling for virtualized clouds. In: 2010 IEEE International Symposium on Parallel and Distributed Processing, Workshops and Phd Forum (IPDPSW)

  8. Yi S, Kondo D, Andrzejak A (2010) Reducing costs of spot instances via checkpointing in the amazon elastic compute cloud. In: Proceedings of 2010 3rd IEEE International Conference on Cloud Computing (CLOUD)

  9. Ficco M, Rak M, Di Martino B (2012) An intrusion detection framework for supporting SLA assessment in cloud computing. In: 2012 Fourth IEEE International Conference on Computational Aspects of Social Networks (CASoN)

  10. Garfinkel SL (2006) Forensic feature extraction and cross-drive analysis. Digit Investig 3:71-81

    Article  Google Scholar 

  11. Case A et al (2008) FACE: automated digital evidence discovery and correlation. Digit Investig 5:S65-S75

    Article  Google Scholar 

  12. Zeng Y, Hu X, Shin KG (2010) Detection of botnets using combined host-and network-level information. IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

  13. Flaglien A, Franke K, Arnes A (2011) Identifying malware using cross-evidence correlation. Advances in digital forensics VII. Springer, Berlin

    Google Scholar 

  14. Kumar R et al (2014) Open source solution for cloud computing platform using OpenStack. Int J Comput Sci Mob Comput 3(5):89-98

    Google Scholar 

  15. Ahmad M (2011) Security risks of cloud computing and its emergence as 5th utility service. Information security and assurance. Springer, Berlin

    Google Scholar 

  16. Tiffany M (2002) A survey of event correlation techniques and related topics. Research paper, Georgia Institute of Technology

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. K. S. P. Kumar Raju.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kumar Raju, B.K.S.P., Geethakumari, G. Event correlation in cloud: a forensic perspective. Computing 98, 1203–1224 (2016). https://doi.org/10.1007/s00607-016-0500-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-016-0500-2

Keywords

Mathematics Subject Classification

Navigation