CFP last date
22 April 2024
Reseach Article

An Intelligent Forensic Framework towards Cloud: Its Ontological Aspects

by Suchana Datta, Chandan Pan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 138 - Number 9
Year of Publication: 2016
Authors: Suchana Datta, Chandan Pan
10.5120/ijca2016908934

Suchana Datta, Chandan Pan . An Intelligent Forensic Framework towards Cloud: Its Ontological Aspects. International Journal of Computer Applications. 138, 9 ( March 2016), 1-8. DOI=10.5120/ijca2016908934

@article{ 10.5120/ijca2016908934,
author = { Suchana Datta, Chandan Pan },
title = { An Intelligent Forensic Framework towards Cloud: Its Ontological Aspects },
journal = { International Journal of Computer Applications },
issue_date = { March 2016 },
volume = { 138 },
number = { 9 },
month = { March },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume138/number9/24404-2016908934/ },
doi = { 10.5120/ijca2016908934 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:39:12.601095+05:30
%A Suchana Datta
%A Chandan Pan
%T An Intelligent Forensic Framework towards Cloud: Its Ontological Aspects
%J International Journal of Computer Applications
%@ 0975-8887
%V 138
%N 9
%P 1-8
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cloud Computing, a relatively new concept and all its associated methodologies offer uncountable advantages now-a-days. These advantages range from integrating different systems, offering guarantee over searching mean distribution and to software tools integration, used by various cloud service providers and consumers. So all these provisions are not only making our lives easier but attract lots of intruders and malicious actors to perform various cloud crimes. This paper aims to contribute towards the design of an ontology based cloud forensic framework with a view to identify the malicious actors. The proposed framework consists of mainly two components - Ontology-Enabled Forensic Blackboard (OFB) and Ontology-Enabled Forensic Controller and Processor (OFCP). The main function of OFB is to communicate with the investigators after receiving the classified crime incident scene collected from VM snapshots where ontology base is used spontaneously to distribute the investigators’ request for proper information relevant to the investigation. Whereas, the function of the OFCP is to interact with different Cloud Malicious Actor Identifier (CMAI) so that accurate information can be gathered based on the distributed request with the help of a meta-ontology framework that acquire and restructure data using different AI reasoning tools and finally the mapping with its corresponding requests is done.

References
  1. Amr Tolba, and Ahmed Ghoneim “IABCF Smarter: An Intelligent Agent IJCST Vol. 3, Issue 4, Oct - Dec 2012.
  2. Accorsi, Rafael, and Keyun Ruan. "Challenges of cloud forensics: A survey of the missing capabilities." ERCIM News 2012, no. 90 (2012).
  3. Simou, Stavros, Christos Kalloniatis, Evangelia Kavakli, and Stefanos Gritzalis. "Cloud forensics: identifying the major issues and challenges." In Advanced Information Systems Engineering, pp. 271-284. Springer International Publishing, 2014.
  4. Guo, Hong, Bo Jin, and Ting Shang. "Forensic investigations in cloud environments." In Computer Science and Information Processing (CSIP), 2012 International Conference on, pp. 248-251. IEEE, 2012.
  5. K. Kent, S. Chevalier, T. Grance and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, Special Publication 800-86, National Institute of Standards and Technology, Gaithersburg, Maryland, 2006.
  6. EurActiv, Cloud computing: A legal maze for Europe, Brussels,Belgium(www.euractiv.com/en/innovation/cloud-computinglegal-maze-europe-linksdossier-502073), 2011.
  7. Noy, N. F. & McGuinness, D. L. (2001), “Ontology Development 101: A Guide to Creating Your First Ontology”, Stanford Knowledge Systems Laboratory, 14th May 2005.
  8. Gruber, T. R. (1993), “A Transition Approach to Portable Ontology Specifications”, Knowledge Acquisition, 5(2), 199-220.
  9. Ding, Y. & Foo, S. (2002), “Ontology Research and Development. Part I – A Review of Ontology Generation”, Journal of Information Science, 28(2), 123-136.
  10. Holsapple, C. & Joshi, K. D. (2002), “A Collaborative Approach to Ontology Design”, Communications of the ACM, 45(2), 42-47.
  11. Mahalingam, K. & Huhns, M. N. (1997), “A Tool for Organising Web Information”, Computer, 30(6), 80-83.
  12. Gruenwald, L., McNutt, G. & Mercier, A. (2003), “Using An Ontology To Improve Search In A Terrorism Database System”, Proceedings. 14th International Workshop on Database and Expert Systems Applications,753-757.
  13. Simons, Peter M. "Parts: A study in ontology." (1987).
  14. M. F. Lopez, A. G. Perez, and N. Juristo, “Methontology: from ontological art towards ontological engineering,” in Proceedings of the AAAI97 Spring Symposium, (Stanford, USA), pp. 33–40, March 1997.
  15. M. Uschold and M. Gr¨uninger, “Ontologies: principles, methods, and applications,” Knowledge Engineering Review, vol. 11, no. 2, pp. 93–155, 1996.
  16. M. Gr¨uninger and M. S. Fox, “Methodology for the design and evaluation of ontologies,” in Proceedings of Workshop on Basic Ontological Issues in Knowledge Sharing held in conjunction with IJCAI-95, 1995.
  17. M. F. Lopez, A. G. Perez, and N. Juristo, “Methontology: from ontological art towards ontological engineering,” in Proceedings of the AAAI97 Spring Symposium, (Stanford, USA), pp. 33–40, March 1997.
  18. V. Raskin, C. F. Hempelmann, K. E. Triezenberg, and S. Nirenburg, “Ontology in information security: a useful theoretical foundation and methodological tool,” in NSPW ’01: Proceedings of the 2001 workshop on New security paradigms, (New York, NY, USA), pp. 53–59, ACM, 2001.
  19. Karie, Nickson M., and Hein S. Venter. Environment." (2013).
  20. Fortis, T-F., Victor Ion Munteanu, and ViorelNegru. "Towards an ontology for cloud services." 2012 Sixth International Conference on Complex, Intelligent and Software Intensive Syst IEEE, 2012.
  21. Han, Taekgyeong, and KwangMongSim, "An ontology-enhanced cloud service discovery system” Proceedings of the International Multi Conference of Engineers and Computer Scientists. Vol. 1. 2010.
  22. Zhang, Miranda, et al. “An Ontology based System for Cloud Infrastructure Services Discovery.” arXiv preprint arXiv:1212.0156 (2012).
  23. Uchibayashi, Toshihiro, Bernady O. Apduhan, and Norio Shiratori. "A framework of an agent-based support system for IaaS service discovery." 13th International Conference on Computational Science and Its Applications (ICCSA), IEEE, 2013.
  24. Bechhofer, Sean. "OWL: Web ontology language." Encyclopedia of Database Systems. Springer US, 2009. 2008-2009.
  25. OWL guide, available at, http:// www.w3.org/TR/owl-guide/
  26. Protégé Ontology Editing Tool, available at http://protege.stanford.edu/
  27. Enron email dataset available at http://www-2.cs.cmu.edu/~enron/
  28. Protégé Wikipedia, available at, http://protegewiki.stanford.edu/wiki/Main_Page
  29. Noy, Natalya F., et al. "Creating semantic web contents with protege-2000." IEEE intelligent systems 2 (2001): 60-71.
  30. Gennari, John H., et al. "The evolution of Protégé: an environment for knowledge-based systems development." International Journal of Human-computer studies 58.1 (2003): 89-123.
Index Terms

Computer Science
Information Sciences

Keywords

Digital forensics cloud computing cloud forensics SaaS PaaS IaaS virtualization Ontology OWL Protégé