IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot

OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot
View Sample PDF
Author(s): Ifeyinwa Eucharia Achumba (Federal University of Technology, Owerri, Nigeria), Kennedy Chinedu Okafor (Federal University of Technology, Owerri, Nigeria), Gloria N. Ezeh (Federal University of Technology, Owerri, Nigeria)and Uchenna Hermes Diala (Federal University of Technology, Owerri, Nigeria)
Copyright: 2015
Volume: 7
Issue: 2
Pages: 22
Source title: International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/IJDCF.2015040103

Purchase

View OpenFlow Virtual Appliance: An Efficient Security Interface For Cloud Forensic Spyware Robot on the publisher's website for pricing and purchasing information.

Abstract

Network forensics vis-a-vis cloud computing offerings can be leveraged to address the needs of enterprise-grade spyware solutions online. A modular, extensible cloud architecture with intrinsic support for efficient security monitoring is proposed and an implementation architecture which facilitates dynamic interface with OpenFlow hardware to create infinite flexibility in managing security decisions is presented. A forensic DataCenter model that integrates remote security monitoring using an intelligent Virtual Security Gateway in a cloud domain was developed as part of the work. An OpenFlow Virtual Appliance is proposed as a security hardware interface for thin clients connected to the Cloud Sypware Robot (CSR) server. The cloud ontology-Software as a Service (SaaS) model was used for the CSR application conveying several security benefits. The goal is to facilitate an open, service-based, online network forensics application that is transparently provisioned for users. The paper proposes a security foundation for next-generation enterprise-grade cloud computing.

Related Content

Shakir A. Mehdiyev, Tahmasib Kh. Fataliyev. © 2024. 17 pages.
Fuhai Jia, Yanru Jia, Jing Li, Zhenghui Liu. © 2024. 13 pages.
Dawei Zhang. © 2024. 16 pages.
Yuwen Zhu, Lei Yu. © 2023. 16 pages.
Vijay Kumar, Sahil Sharma, Chandan Kumar, Aditya Kumar Sahu. © 2023. 14 pages.
Wenjun Yao, Ying Jiang, Yang Yang. © 2023. 20 pages.
Dawei Zhang. © 2023. 14 pages.
Body Bottom