Dynamic Migration Technology Platform in the Cloud Computer Forensics Applied Research

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 260)


This paper presents a new cloud computing environment, computer forensics, and migration of a virtual machine image file, the virtual machine images from cloud computing platform migration to the local forensics environment analysis, the cloud computing platform, electronic evidence and the performance and application of experimental analysis comparing the two migration strategy.


Dynamic migration Cloud computing Computer forensics Virtual machine 


  1. 1.
    Clark C, Fraser K, Hand S et al (2005) Live migration of virtual machines. In: Proceedings of the 2nd international conference on networked systems design and implementation, Berkeley, CA, USAGoogle Scholar
  2. 2.
    Wood T (2007) Blaek-box and Gray-box strategies for virtual machine migration. In: Proceedings of the 4th international conference on networked systems design and implementation, IEEE PressGoogle Scholar
  3. 3.
    LaVelle C, Konrad A (2007) FriendlyRoboCoPy: A GUI to RoboCoPy for computer forensic investigators. Digital Invest 4:16–23Google Scholar
  4. 4.
    Arnold J (2008) Ksplice: An automatic system for rebootless kernel security updates. Ph.D. thesis, Massachusetts Institute of TechnologyGoogle Scholar
  5. 5.
    Zhou G, Cao Q, Mai Y (2011) Forensic analysis using migration in cloud computing environment. In: 2nd International conference on intelligent transportation systems and intelligent computing, Suzhou, ChinaGoogle Scholar
  6. 6.
    Fasheng, based on resource management end-system traffic shaping algorithm (2007). Comput Eng Appl (18):117–119Google Scholar
  7. 7.
    Grossman RL, Yunhong Gu (2009) On the varieties of clouds for data intensive computing. IEEE Data Eng Bull 32(1):44–50Google Scholar
  8. 8.
    Tu WW, Zhang J, Zhang X (2006) Grade allocation token parameter of traffic shaping algorithm. Comput Appl (9):2175–2177Google Scholar
  9. 9.
    Ladan-Mozes E, Shavit N (2008) An optimistic approach to lock-free FIFO queues. Distrib Comput 20(5):323–341CrossRefMATHGoogle Scholar
  10. 10.
    Yadav AK, Tomar R, Kumar D, Gupta H (2012) Security and privacy concerns in cloud computing. Comput Sci Softw Eng 2(5)Google Scholar
  11. 11.
    Valenzuela JL (2004) A hierarchical token bucket algorithm to enhance QoS in IEEE 802.11: proposal, implementation and evaluation. In: IEEE 60th vehicular technology conference, 2004. VTC2004-FallGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.School of Computer Engineering, Shenzhen PolyTechnicShenzhenChina

Personalised recommendations