SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 4, Issue 1 (Sep-Oct. 2012), PP 45-48
www.iosrjournals.org
www.iosrjournals.org 45 | Page
Cloud Forensics- An IS Approach
Vipul S. Chawathe1
, Prof. Dr. Bandu B. Meshram2
1
VJTI, student, 2
HoD, Computer Engineering Department
Abstract : Digital Forensics is an increasingly important and diverse R&D area charged with providing vital
evidence to legal proceedings and gathering data to determine vulnerabilities exploited during system attacks.
Clouds’ forensics requires Intelligent Systems owing to the voluminous data content within the data store of the
service provider. The functional programming that dominates data center data processing is observed.
Keywords: Cloud, Data Center, Digital Forensics, Functional Programming, Intelligent Systems
I. INTRODUCTION
The Cloud hosting is where data centers really shine in electronic media. Every major IT firm has an
offering of how consumers can be served by data centers wherein their cloud will be scaled as per Service Level
Agreement (SLA) bounded only by the capacity of the data center. Hence, almost any cloud related product
offering for cloud services providers will offer to visualize logical clubbing amongst the data centers internal
resources.
When the data source is a cloud in some data center, the data center host OS is responsible for
guarantying independence amongst present clouds. Also, data source resources are meant to be utilized for
clouds as per SLAs and the host OS should never over-utilize resources causing availability issues to the cloud.
For processing data processing of data while it’s still of forensic relevance requires a light-weight reactive
model. Such an Intelligent Systems (IS) agent model is explored in this paper.
The remaining material is laid out as follows. Works related with IS agents are briefly inspected in
Section II. Section III takes a peek at the functional programming taking inside an agent instance for forensics
case. Section IV summarizes observation. Section V gives the conclusion.
II. RELATED WORKS
The terms Autonomic Computing, Self-Managing Systems, and Self-Adaptive Systems are used
interchangeably. [2] An agent can perform some activities autonomously. [1] Self-Management properties of
agents include Autonomy, Social Ability, Reactivity, Proactiveness. [2] This is very different from Object
Oriented Paradigm. Such differences with Object Oriented Programming have yielded multi-paradigm
languages. [3]
For effective and accurate agent operation, the metamodels corresponding to the individual language
have to be grasped by the programmer. The metamodels are used by the architect when design is driven by the
model. Such an exhaustive approach having roots in UML, of MDD with agent as the target is FAML. [4] UML
is restrictive in its centered around pre-existing real world model of class-object hierarchy. Any adaptive
intelligent system software agent’s architecture is better understood by domain specific way. [5]
Multiple toolkits for developing agents have been implemented. [6][7][8] With understanding of points
covered by above works, it’s possible to head forth for prototyping Intelligent agent system targeting the cloud
forensics data.
III. FUNCTIONAL PROGRAMMING IN CLOUD FORENSICS
A Cloud is a type of parallel and distributed system consisting of a collection of interconnected and
virtualized computers that are dynamically provisioned and presented as one or more unified computing
resources based on service-level agreements established through negotiation between the service provider and
consumers. [9]
All the VMs are tiers of multi-tier services. From every tier of data center, forensic data will get
collected. For simplicity, before proceeding further to implement the agent lets agree on the data collected as
sequences of tuples of user id, process, path, & process architecture(32/64-bit). Such sequences will be either
from the system suspected by the forensics expert, its snapshot before being possibly corrupted or another
reference tier of the cloud. Such data is easily obtained using guest view casting techniques developed using
product specific documentation such as MSDN Technet combined with RemoteApp or an equivalent
functionality.
As all data center operations are data centric, the beginning will be modeling the data flow functioning
as DFD. The sequences mentioned above are for purposes of actual system taken to be represented using well-
Cloud Forensics- An IS Approach
www.iosrjournals.org 46 | Page
defined .csv files. Instead of accounting working from level 1 overview, level 2 is directly shown to look
directly inside the interesting agent component..
The pheromone level refers to suspiciousness of individual entry of initial CSV. Thus, they will be the
data to be shared amongst agents every time new CSV is available. These agents have been identified as ants by
some. [10]
Observe that whenever .csv arrives, pheromones might be updated from either path asynchronously,
depending on the agent for which .csv arrived. This is asynchronous operation. The functioning of agent on data
is well defined yet generic. Also the invocation functionality is asynchronous. The data structure assumed earlier
is fixed. Thus, statically typed asynchronous functional programming is required by the ant. F# is the statically
typed programming language that’s also based on asynchronous operation. [11] The above diagram maps to F#
MVC pattern controller code like:
iniB.Click.Add (fun _ -> mine 'i' |>nextView(*initM*)
extB.IsEnabled<- true
intB.IsEnabled<- true)
extB.Click.Add (fun _ -> mine 'r'|> nextView
resulB.IsEnabled<- true)
intB.Click.Add (fun _ -> mine 'o'|> nextView
…
Observe that the control flow eventually is retargeted to generate new MVC view. The three different
click event handlers correspond one-to-one with the three processes from level 2 DFD. Such empowering
programming language implemented control flow retargeting feature another strength making F# functional
programming more suited than other options at avail. [12] Now let’s examine more closely how ant agents are
updating the pheromones.
Cloud Forensics- An IS Approach
www.iosrjournals.org 47 | Page
This will translate into MVC model code as:
let containsElem2 anotherSeq ( proc, path, user_id, arch) = /// proces+ userid:
common domain cloud
Seq.exists (fun (a, _, c, _) -> proc=a && user_id=c) anotherSeq
let evalPhero cond i =( if( cond) /// Pheromone computation by Ant: "i"
then phero.currLs.[i]<- phero.currLs.[i]- 1 ///
increment pheromone
else phero.currLs.[i]<- phero.currLs.[i]+ 1 ) ///
evaporate pheromone
match op with/// Futures
|'i'-> fileNames.curr<- dlg.FileName
phero.currLs<- Array.create(( CSVFileEnumerator fileNames.curr|>
Seq.length)- 1) 5
( CSVFileEnumerator fileNames.curr, phero.currLs)
|'r'-> fileNames.outsider<- dlg.FileName
let containsElem (proc, path, user_id, arch)= /// process+ Arch: separate
m/c tiers
Seq.exists (fun (a, _, _, d) -> proc=a && arch=d) (CSVFileEnumerator
fileNames.outsider)
let b =containsElem2( CSVFileEnumerator fileNames.outsider)
phero.currLs |> Array.Parallel.iteri (fun i x -> /// Ant Colony of source
process number of ants
evalPhero (CSVFileEnumerator fileNames.curr |> Seq.nth i |> containsElem) i
evalPhero (CSVFileEnumerator fileNames.curr |> Seq.nth i |> b)
i)///currying
( CSVFileEnumerator fileNames.outsider, phero.currLs)
|'o'-> fileNames.old<- dlg.FileName
Cloud Forensics- An IS Approach
www.iosrjournals.org 48 | Page
let c = containsElem2( CSVFileEnumerator fileNames.old)
let containsElem4( proc, path, user_id, arch)= /// process+ path: separate
sample instances
Seq.exists( fun( a, b, _, _)-> proc= a && path= b)( CSVFileEnumerator
fileNames.old)
phero.currLs|> Array.Parallel.iteri( fun i x -> /// Another Ant Colony of
source process number of ants
evalPhero(CSVFileEnumerator fileNames.curr|> Seq.nth i|> c) i ///currying
evalPhero(CSVFileEnumerator fileNames.curr|> Seq.nth i|> containsElem4) i)
(CSVFileEnumerator fileNames.old, phero.currLs)
Of particular interest is the match statement. In any functional language functions are evaluated as first
class values. And in F# values are statically typed, but match statement will be given valid input only during
runtime. This is done using the futures pattern. [13]
IV. OBSERVATIONS
Agent ant instantiation corresponding to each pheromone level maintained is done in parallel. Finally,
remember the updating of pheromones was initiated as reaction to forensic expert’s “Click” user action. Thus, it
occurred concurrently when the user interface was responsive to the user.
Reactive, concurrent, parallel, asynchronous programming occurring together is termed as “bot” in
Intelligent Systems domain and the functional language implementation is known as “agent”.
Agents are coupled to their environment, designed for reactive, proactive behavior having social ability
as can be seen through pheromone activity.
V. CONCLUSION
With forensics as trial, that can be replaced by guestviews relevant for predicting trends for future
scaling, advertising services and so on, the concept for applying an IS is evolved. When agent is serving very
specific task, it’s simpler to implement using functional programming. Statically-typed data such as that from
data center which hosts clouds is well-suited for functional programming by F#. Repetitive complex task of
classification is submitted to agent.
Acknowledgements
This paper will be incomplete without acknowledging the thoughtful arguments and counter-arguments
happening within VJTI’s Computer Engineering Department’s highly intellectual faculty and post graduate
students as well.
REFERENCES
[1] Caroline C. Hayes, Agents in a Nutshell- A Very Brief Introduction, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA
ENGINEERING, VOL. 11, NO. 1, JANUARY/FEBRUARY 1999
[2] Huebscher, M. C. and McCann, J. A. 2008. A survey of autonomic computing—degrees, models, and applications. ACM Comput.
Surv., 40, 3, Article 7 (August 2008), 28 pages DOI = 10.1145/1380584.1380585 http://doi.acm.org/10.1145/1380584.1380585
[3] Bjarne Stroustrup, Why C++ is not just an object-oriented programming language, In {OOPSLA} '95: Addendum to the proceedings
of the 10th annual conference on Object-oriented programming systems, languages, and applications (Addendum) (1995), pp. 1-13,
doi:http://dx.doi.org/10.1145/260094.260207
[4] Ghassan Beydoun, Graham Low, Brian Henderson-Sellers, Haralambos Mouratidis, Jorge J. Gomez-Sanz, Juan Pavo´ n, and Cesar
Gonzalez-Perez, FAML: A Generic Metamodel for MAS Development, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING,
VOL. 35, NO. 6, NOVEMBER/DECEMBER 2009
[5] Barbara Hayes-Roth, Karl Pfleger, Philippe Lalanda, Philippe Morignot, and Marko Balabanovic, A Domain- Specific Software
Architecture for Adaptive Intelligent Systems, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 21, NO. 4, APRIL
1995
[6] FRANCO ZAMBONELLI, NICHOLAS R. JENNINGS, MICHAEL WOOLDRIDGE, Developing Multiagent Systems: The Gaia
Methodology, ACM Transactions on Software Engineering and Methodology, Vol. 12, No. 3, July 2003, Pages 317–370.
[7] MICHAEL J. NORTH, NICHOLSON T. COLLIER, and JERRY R. VOS, Experiences Creating Three Implementations of the
Repast Agent Modeling Toolkit, ACM Transactions on Modeling and Computer Simulation, Vol. 16, No. 1, January 2006, Pages 1–
25.
[8] J. P. Bigus, D. A. Schlosnagle, J. R. Pilgrim, W. N. Mills III, Y. Diao, ABLE: A toolkit for building multiagent autonomic systems,
IBM SYSTEMS JOURNAL, VOL 41, NO 3, 2002
[9] http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf
[10] Juan Luis Olmo, José Raúl Romero, Sebastián Ventura, Using Ant Programming Guided by Grammar for Building Rule-Based
Classifiers, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 41, NO. 6,
DECEMBER 2011
[11] Don Syme, Tomas Petricek, Dmitry Lomov, The F# Asynchronous Programming Model, In Proceedings of PADL 2011.
[12] Tomas Petricek, Don Syme, Joinads: a retargetable control-flow construct for reactive, parallel and concurrent programming,
Joinads: a retargetable control-flow construct for reactive, parallel and concurrent programming, Proceedings of Practical Aspects of
Declarative Languages (PADL), 2011
[13] Tomas Petricek, Alan Mycroft, Don Syme Extending monads with pattern matching. In Proceedings of the 4th ACM symposium by
SIGPLAN Not. 46, 12 (September 2011), 1-12. DOI=10.1145/2096148.2034677 http://doi.acm.org/10.1145/2096148.2034677

Weitere ähnliche Inhalte

Was ist angesagt?

An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...ijtsrd
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AIObject Automation
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Drjabez
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNishanth Gandhidoss
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesConfident Technologies
 
Guardians of the future what should we do to secure future cyberspace
Guardians of the future  what should we do to secure future cyberspace Guardians of the future  what should we do to secure future cyberspace
Guardians of the future what should we do to secure future cyberspace Aladdin Dandis
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningeSAT Journals
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standardsUlf Mattsson
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTIJEACS
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Priyanka Aash
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...CODE BLUE
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY anurama
 

Was ist angesagt? (20)

An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
An Assessment of Intrusion Detection System IDS and Data Set Overview A Compr...
 
OA_Cyber security course with AI
OA_Cyber security course with AIOA_Cyber security course with AI
OA_Cyber security course with AI
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTINGNETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
NETWORK INTRUSION DETECTION AND NODE RECOVERY USING DYNAMIC PATH ROUTING
 
Image-Based Authentication from Confident Technologies
Image-Based Authentication from Confident TechnologiesImage-Based Authentication from Confident Technologies
Image-Based Authentication from Confident Technologies
 
Guardians of the future what should we do to secure future cyberspace
Guardians of the future  what should we do to secure future cyberspace Guardians of the future  what should we do to secure future cyberspace
Guardians of the future what should we do to secure future cyberspace
 
Intrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern miningIntrusion detection and anomaly detection system using sequential pattern mining
Intrusion detection and anomaly detection system using sequential pattern mining
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
The emerging pci dss and nist standards
The emerging pci dss and nist standardsThe emerging pci dss and nist standards
The emerging pci dss and nist standards
 
A Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOTA Novel Security Approach for Communication using IOT
A Novel Security Approach for Communication using IOT
 
Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES Cyber security maturity model- IT/ITES
Cyber security maturity model- IT/ITES
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITYDYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
DYNAMIC KEY REFRESHMENT FOR SMART GRID MESH NETWORK SECURITY
 

Andere mochten auch

11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computingAlexander Decker
 
Cloud Application Logging for Forensics
Cloud Application Logging for ForensicsCloud Application Logging for Forensics
Cloud Application Logging for ForensicsRaffael Marty
 
Adding event reconstruction to a cloud forensic readiness
Adding event reconstruction to a cloud forensic readinessAdding event reconstruction to a cloud forensic readiness
Adding event reconstruction to a cloud forensic readinessVictor Kebande
 
Cloud Computing Forensic Science
 Cloud Computing Forensic Science  Cloud Computing Forensic Science
Cloud Computing Forensic Science David Sweigert
 
Memory forensics using VMI for cloud computing
Memory forensics using VMI for cloud computingMemory forensics using VMI for cloud computing
Memory forensics using VMI for cloud computingPriyanka Aash
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensicssdavis532
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropboxINSIGHT FORENSIC
 

Andere mochten auch (7)

11.cyber forensics in cloud computing
11.cyber forensics in cloud computing11.cyber forensics in cloud computing
11.cyber forensics in cloud computing
 
Cloud Application Logging for Forensics
Cloud Application Logging for ForensicsCloud Application Logging for Forensics
Cloud Application Logging for Forensics
 
Adding event reconstruction to a cloud forensic readiness
Adding event reconstruction to a cloud forensic readinessAdding event reconstruction to a cloud forensic readiness
Adding event reconstruction to a cloud forensic readiness
 
Cloud Computing Forensic Science
 Cloud Computing Forensic Science  Cloud Computing Forensic Science
Cloud Computing Forensic Science
 
Memory forensics using VMI for cloud computing
Memory forensics using VMI for cloud computingMemory forensics using VMI for cloud computing
Memory forensics using VMI for cloud computing
 
Cloud Forensics
Cloud ForensicsCloud Forensics
Cloud Forensics
 
(130928) #fitalk cloud storage forensics - dropbox
(130928) #fitalk   cloud storage forensics - dropbox(130928) #fitalk   cloud storage forensics - dropbox
(130928) #fitalk cloud storage forensics - dropbox
 

Ă„hnlich wie Cloud Forensics Approach Using Intelligent Systems

Write a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxWrite a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxambersalomon88660
 
Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019ijsrd.com
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSosurya kumar palla
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
 
Software Architecture for Robotics
Software Architecture for RoboticsSoftware Architecture for Robotics
Software Architecture for RoboticsLorran Pegoretti
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMIJNSA Journal
 
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT ijsptm
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...CSCJournals
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud ComputingMonica Rivera
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud ComputingCloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computingijtsrd
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architectureraksharao
 
Object and component based middleware for distributed system development
Object and component based middleware for distributed system developmentObject and component based middleware for distributed system development
Object and component based middleware for distributed system developmentektabhalwara
 
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...ijwscjournal
 
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...ijwscjournal
 
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...ijwscjournal
 

Ă„hnlich wie Cloud Forensics Approach Using Intelligent Systems (20)

Write a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docxWrite a 1-page summary for each topic listed below1. Scripting.docx
Write a 1-page summary for each topic listed below1. Scripting.docx
 
Ijsrdv1 i4019
Ijsrdv1 i4019Ijsrdv1 i4019
Ijsrdv1 i4019
 
Cloud Computing and PSo
Cloud Computing and PSoCloud Computing and PSo
Cloud Computing and PSo
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Software Architecture for Robotics
Software Architecture for RoboticsSoftware Architecture for Robotics
Software Architecture for Robotics
 
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEMARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
ARCHITECTURE OF A IDENTITY BASED FIREWALL SYSTEM
 
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
 
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud ComputingCloud Intrusion and Autonomic Management in Autonomic Cloud Computing
Cloud Intrusion and Autonomic Management in Autonomic Cloud Computing
 
publishable paper
publishable paperpublishable paper
publishable paper
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
Module1 Mobile Computing Architecture
Module1 Mobile Computing ArchitectureModule1 Mobile Computing Architecture
Module1 Mobile Computing Architecture
 
Object and component based middleware for distributed system development
Object and component based middleware for distributed system developmentObject and component based middleware for distributed system development
Object and component based middleware for distributed system development
 
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
 
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
 
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
A COMPOSITE DESIGN PATTERN FOR SERVICE INJECTION AND COMPOSITION OF WEB SERVI...
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

KĂĽrzlich hochgeladen

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

KĂĽrzlich hochgeladen (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 âś“Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Cloud Forensics Approach Using Intelligent Systems

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 1 (Sep-Oct. 2012), PP 45-48 www.iosrjournals.org www.iosrjournals.org 45 | Page Cloud Forensics- An IS Approach Vipul S. Chawathe1 , Prof. Dr. Bandu B. Meshram2 1 VJTI, student, 2 HoD, Computer Engineering Department Abstract : Digital Forensics is an increasingly important and diverse R&D area charged with providing vital evidence to legal proceedings and gathering data to determine vulnerabilities exploited during system attacks. Clouds’ forensics requires Intelligent Systems owing to the voluminous data content within the data store of the service provider. The functional programming that dominates data center data processing is observed. Keywords: Cloud, Data Center, Digital Forensics, Functional Programming, Intelligent Systems I. INTRODUCTION The Cloud hosting is where data centers really shine in electronic media. Every major IT firm has an offering of how consumers can be served by data centers wherein their cloud will be scaled as per Service Level Agreement (SLA) bounded only by the capacity of the data center. Hence, almost any cloud related product offering for cloud services providers will offer to visualize logical clubbing amongst the data centers internal resources. When the data source is a cloud in some data center, the data center host OS is responsible for guarantying independence amongst present clouds. Also, data source resources are meant to be utilized for clouds as per SLAs and the host OS should never over-utilize resources causing availability issues to the cloud. For processing data processing of data while it’s still of forensic relevance requires a light-weight reactive model. Such an Intelligent Systems (IS) agent model is explored in this paper. The remaining material is laid out as follows. Works related with IS agents are briefly inspected in Section II. Section III takes a peek at the functional programming taking inside an agent instance for forensics case. Section IV summarizes observation. Section V gives the conclusion. II. RELATED WORKS The terms Autonomic Computing, Self-Managing Systems, and Self-Adaptive Systems are used interchangeably. [2] An agent can perform some activities autonomously. [1] Self-Management properties of agents include Autonomy, Social Ability, Reactivity, Proactiveness. [2] This is very different from Object Oriented Paradigm. Such differences with Object Oriented Programming have yielded multi-paradigm languages. [3] For effective and accurate agent operation, the metamodels corresponding to the individual language have to be grasped by the programmer. The metamodels are used by the architect when design is driven by the model. Such an exhaustive approach having roots in UML, of MDD with agent as the target is FAML. [4] UML is restrictive in its centered around pre-existing real world model of class-object hierarchy. Any adaptive intelligent system software agent’s architecture is better understood by domain specific way. [5] Multiple toolkits for developing agents have been implemented. [6][7][8] With understanding of points covered by above works, it’s possible to head forth for prototyping Intelligent agent system targeting the cloud forensics data. III. FUNCTIONAL PROGRAMMING IN CLOUD FORENSICS A Cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers. [9] All the VMs are tiers of multi-tier services. From every tier of data center, forensic data will get collected. For simplicity, before proceeding further to implement the agent lets agree on the data collected as sequences of tuples of user id, process, path, & process architecture(32/64-bit). Such sequences will be either from the system suspected by the forensics expert, its snapshot before being possibly corrupted or another reference tier of the cloud. Such data is easily obtained using guest view casting techniques developed using product specific documentation such as MSDN Technet combined with RemoteApp or an equivalent functionality. As all data center operations are data centric, the beginning will be modeling the data flow functioning as DFD. The sequences mentioned above are for purposes of actual system taken to be represented using well-
  • 2. Cloud Forensics- An IS Approach www.iosrjournals.org 46 | Page defined .csv files. Instead of accounting working from level 1 overview, level 2 is directly shown to look directly inside the interesting agent component.. The pheromone level refers to suspiciousness of individual entry of initial CSV. Thus, they will be the data to be shared amongst agents every time new CSV is available. These agents have been identified as ants by some. [10] Observe that whenever .csv arrives, pheromones might be updated from either path asynchronously, depending on the agent for which .csv arrived. This is asynchronous operation. The functioning of agent on data is well defined yet generic. Also the invocation functionality is asynchronous. The data structure assumed earlier is fixed. Thus, statically typed asynchronous functional programming is required by the ant. F# is the statically typed programming language that’s also based on asynchronous operation. [11] The above diagram maps to F# MVC pattern controller code like: iniB.Click.Add (fun _ -> mine 'i' |>nextView(*initM*) extB.IsEnabled<- true intB.IsEnabled<- true) extB.Click.Add (fun _ -> mine 'r'|> nextView resulB.IsEnabled<- true) intB.Click.Add (fun _ -> mine 'o'|> nextView … Observe that the control flow eventually is retargeted to generate new MVC view. The three different click event handlers correspond one-to-one with the three processes from level 2 DFD. Such empowering programming language implemented control flow retargeting feature another strength making F# functional programming more suited than other options at avail. [12] Now let’s examine more closely how ant agents are updating the pheromones.
  • 3. Cloud Forensics- An IS Approach www.iosrjournals.org 47 | Page This will translate into MVC model code as: let containsElem2 anotherSeq ( proc, path, user_id, arch) = /// proces+ userid: common domain cloud Seq.exists (fun (a, _, c, _) -> proc=a && user_id=c) anotherSeq let evalPhero cond i =( if( cond) /// Pheromone computation by Ant: "i" then phero.currLs.[i]<- phero.currLs.[i]- 1 /// increment pheromone else phero.currLs.[i]<- phero.currLs.[i]+ 1 ) /// evaporate pheromone match op with/// Futures |'i'-> fileNames.curr<- dlg.FileName phero.currLs<- Array.create(( CSVFileEnumerator fileNames.curr|> Seq.length)- 1) 5 ( CSVFileEnumerator fileNames.curr, phero.currLs) |'r'-> fileNames.outsider<- dlg.FileName let containsElem (proc, path, user_id, arch)= /// process+ Arch: separate m/c tiers Seq.exists (fun (a, _, _, d) -> proc=a && arch=d) (CSVFileEnumerator fileNames.outsider) let b =containsElem2( CSVFileEnumerator fileNames.outsider) phero.currLs |> Array.Parallel.iteri (fun i x -> /// Ant Colony of source process number of ants evalPhero (CSVFileEnumerator fileNames.curr |> Seq.nth i |> containsElem) i evalPhero (CSVFileEnumerator fileNames.curr |> Seq.nth i |> b) i)///currying ( CSVFileEnumerator fileNames.outsider, phero.currLs) |'o'-> fileNames.old<- dlg.FileName
  • 4. Cloud Forensics- An IS Approach www.iosrjournals.org 48 | Page let c = containsElem2( CSVFileEnumerator fileNames.old) let containsElem4( proc, path, user_id, arch)= /// process+ path: separate sample instances Seq.exists( fun( a, b, _, _)-> proc= a && path= b)( CSVFileEnumerator fileNames.old) phero.currLs|> Array.Parallel.iteri( fun i x -> /// Another Ant Colony of source process number of ants evalPhero(CSVFileEnumerator fileNames.curr|> Seq.nth i|> c) i ///currying evalPhero(CSVFileEnumerator fileNames.curr|> Seq.nth i|> containsElem4) i) (CSVFileEnumerator fileNames.old, phero.currLs) Of particular interest is the match statement. In any functional language functions are evaluated as first class values. And in F# values are statically typed, but match statement will be given valid input only during runtime. This is done using the futures pattern. [13] IV. OBSERVATIONS Agent ant instantiation corresponding to each pheromone level maintained is done in parallel. Finally, remember the updating of pheromones was initiated as reaction to forensic expert’s “Click” user action. Thus, it occurred concurrently when the user interface was responsive to the user. Reactive, concurrent, parallel, asynchronous programming occurring together is termed as “bot” in Intelligent Systems domain and the functional language implementation is known as “agent”. Agents are coupled to their environment, designed for reactive, proactive behavior having social ability as can be seen through pheromone activity. V. CONCLUSION With forensics as trial, that can be replaced by guestviews relevant for predicting trends for future scaling, advertising services and so on, the concept for applying an IS is evolved. When agent is serving very specific task, it’s simpler to implement using functional programming. Statically-typed data such as that from data center which hosts clouds is well-suited for functional programming by F#. Repetitive complex task of classification is submitted to agent. Acknowledgements This paper will be incomplete without acknowledging the thoughtful arguments and counter-arguments happening within VJTI’s Computer Engineering Department’s highly intellectual faculty and post graduate students as well. REFERENCES [1] Caroline C. Hayes, Agents in a Nutshell- A Very Brief Introduction, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 11, NO. 1, JANUARY/FEBRUARY 1999 [2] Huebscher, M. C. and McCann, J. A. 2008. A survey of autonomic computing—degrees, models, and applications. ACM Comput. Surv., 40, 3, Article 7 (August 2008), 28 pages DOI = 10.1145/1380584.1380585 http://doi.acm.org/10.1145/1380584.1380585 [3] Bjarne Stroustrup, Why C++ is not just an object-oriented programming language, In {OOPSLA} '95: Addendum to the proceedings of the 10th annual conference on Object-oriented programming systems, languages, and applications (Addendum) (1995), pp. 1-13, doi:http://dx.doi.org/10.1145/260094.260207 [4] Ghassan Beydoun, Graham Low, Brian Henderson-Sellers, Haralambos Mouratidis, Jorge J. Gomez-Sanz, Juan Pavo´ n, and Cesar Gonzalez-Perez, FAML: A Generic Metamodel for MAS Development, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 35, NO. 6, NOVEMBER/DECEMBER 2009 [5] Barbara Hayes-Roth, Karl Pfleger, Philippe Lalanda, Philippe Morignot, and Marko Balabanovic, A Domain- Specific Software Architecture for Adaptive Intelligent Systems, IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 21, NO. 4, APRIL 1995 [6] FRANCO ZAMBONELLI, NICHOLAS R. JENNINGS, MICHAEL WOOLDRIDGE, Developing Multiagent Systems: The Gaia Methodology, ACM Transactions on Software Engineering and Methodology, Vol. 12, No. 3, July 2003, Pages 317–370. [7] MICHAEL J. NORTH, NICHOLSON T. COLLIER, and JERRY R. VOS, Experiences Creating Three Implementations of the Repast Agent Modeling Toolkit, ACM Transactions on Modeling and Computer Simulation, Vol. 16, No. 1, January 2006, Pages 1– 25. [8] J. P. Bigus, D. A. Schlosnagle, J. R. Pilgrim, W. N. Mills III, Y. Diao, ABLE: A toolkit for building multiagent autonomic systems, IBM SYSTEMS JOURNAL, VOL 41, NO 3, 2002 [9] http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf [10] Juan Luis Olmo, JosĂ© RaĂşl Romero, Sebastián Ventura, Using Ant Programming Guided by Grammar for Building Rule-Based Classifiers, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 41, NO. 6, DECEMBER 2011 [11] Don Syme, Tomas Petricek, Dmitry Lomov, The F# Asynchronous Programming Model, In Proceedings of PADL 2011. [12] Tomas Petricek, Don Syme, Joinads: a retargetable control-flow construct for reactive, parallel and concurrent programming, Joinads: a retargetable control-flow construct for reactive, parallel and concurrent programming, Proceedings of Practical Aspects of Declarative Languages (PADL), 2011 [13] Tomas Petricek, Alan Mycroft, Don Syme Extending monads with pattern matching. In Proceedings of the 4th ACM symposium by SIGPLAN Not. 46, 12 (September 2011), 1-12. DOI=10.1145/2096148.2034677 http://doi.acm.org/10.1145/2096148.2034677