Advances, Systems and Applications
Trust | Method | Preserving traces of | Protection from | Parallel | |
---|---|---|---|---|---|
required | anti-forensic attacks | anti-forensic | processing | ||
attacks of type 1 | attacks of type 2 | of past logs | |||
Remote data acquisition [65] | OS, HV, Host, HW | Agent | |||
programs | |||||
Management plane [66] | HV, Host, HW | CoW snapshots | Depends on | ||
of VMs | frequency of snapshots | ||||
FECloud [67] | OS, HV, Host, HW | VFS | ✓ | ||
with SecLaaS [32] | monitor | (audit logging) | |||
LogDrive (proposal) | HV, Host, HW | Log-structured | ✓ | ✓ | |
virtual storage |