Cloud Computing is a technological development that has been warmly discussed in recent years and has seen significant increases in usage, especially on the IAAS Cloud Computing model. The high rate of development of IAAS Cloud Computing model is in line with the high number of crimes involving IAAS Cloud Computing model on server virtualization. When a computer crime occurs and a digital forensic investigation will be carried out to uncover the case, it raises issues related to the acquisition of digital evidence. Because the acquisition model in general, it is done only to one operating system, while in virtualization there is more than one operating system, so the acquisition technique in general cannot be used because it takes only one operating system involved crime, and cannot acquire the whole data server related privacy data in other virtual operating systems. Therefore, research to make the acquisition system of server virtualization is needed . The focus in this research is to make system acquisition in server virtualization Proxmox using the live forensic method to produce a system that can acquire virtualization without disrupting the overall data server and in accordance with the principle of digital forensics. The resulting acquisition system can be a reference for i nvestigators to investigate the IAAS Cloud Computing model on Proxmox virtualization and facilitate the investigator's work in the use of the system because the investigator simply chooses which virtual operating system to acquire, after which the system will work on its own the acquisition.
[1]
Mamoona Rafique,et al.
Exploring Static and Live Digital Forensics: Methods, Practices and Tools
,
2013
.
[2]
Povar Digambar,et al.
Novel Digital Forensic Framework for Cloud Computing Environment
,
2015
.
[3]
Alan T. Sherman,et al.
Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques
,
2012,
Digit. Investig..
[4]
Anton Yudhana,et al.
Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method
,
2018,
Scientific Journal of Informatics.
[5]
Sangjin Lee,et al.
A research on the investigation method of digital forensics for a VMware Workstation's virtual machine
,
2012,
Math. Comput. Model..
[6]
Subhajyoti Bandyopadhyay,et al.
Cloud Computing - The Business Perspective
,
2011,
2011 44th Hawaii International Conference on System Sciences.
[7]
Arunima Jaiswal,et al.
Virtualization in Cloud Computing
,
2014
.
[8]
Steven Furnell,et al.
A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment
,
2016,
ARES.
[9]
Didik Sudyana,et al.
ANALYSIS AND EVALUATION DIGITAL FORENSIC INVESTIGATION FRAMEWORK USING ISO 27037:2012
,
2019
.
[10]
Simon Tjoa,et al.
Evidence and Cloud Computing: The Virtual Machine Introspection Approach
,
2013,
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..