Investigation methodology of a virtual desktop infrastructure for IoT

Doowon Jeong, Jungheum Park, Sangjin Lee, Chulhoon Kang

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.

Original languageEnglish
Article number689870
JournalJournal of Applied Mathematics
Volume2015
DOIs
Publication statusPublished - 2015

Fingerprint

Internet of Things
Cloud computing
Infrastructure
Methodology
Servers
Cloud Computing
Digital Forensics
Costs
Industry
Experiments
Virtualization
Invasion
Integrity
Internet of things
Continue
Server
Damage
Verify
Minimise
Experiment

ASJC Scopus subject areas

  • Applied Mathematics

Cite this

Investigation methodology of a virtual desktop infrastructure for IoT. / Jeong, Doowon; Park, Jungheum; Lee, Sangjin; Kang, Chulhoon.

In: Journal of Applied Mathematics, Vol. 2015, 689870, 2015.

Research output: Contribution to journalArticle

Jeong, Doowon ; Park, Jungheum ; Lee, Sangjin ; Kang, Chulhoon. / Investigation methodology of a virtual desktop infrastructure for IoT. In: Journal of Applied Mathematics. 2015 ; Vol. 2015.
@article{4821345ae1f34b74bb50e778bbf72677,
title = "Investigation methodology of a virtual desktop infrastructure for IoT",
abstract = "Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.",
author = "Doowon Jeong and Jungheum Park and Sangjin Lee and Chulhoon Kang",
year = "2015",
doi = "10.1155/2015/689870",
language = "English",
volume = "2015",
journal = "Journal of Applied Mathematics",
issn = "1110-757X",
publisher = "Hindawi Publishing Corporation",

}

TY - JOUR

T1 - Investigation methodology of a virtual desktop infrastructure for IoT

AU - Jeong, Doowon

AU - Park, Jungheum

AU - Lee, Sangjin

AU - Kang, Chulhoon

PY - 2015

Y1 - 2015

N2 - Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.

AB - Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.

UR - http://www.scopus.com/inward/record.url?scp=84926613230&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84926613230&partnerID=8YFLogxK

U2 - 10.1155/2015/689870

DO - 10.1155/2015/689870

M3 - Article

AN - SCOPUS:84926613230

VL - 2015

JO - Journal of Applied Mathematics

JF - Journal of Applied Mathematics

SN - 1110-757X

M1 - 689870

ER -