[1] |
PASQUALE L , HANVEY S , MCGLOIN M ,et al. Adaptive evidence collection in the cloud using attack scenarios[J]. Computers& Security, 2016,59(6): 236-254.
|
[2] |
林闯, 苏文博, 孟坤 ,等. 云计算安全:架构、机制与模型评价[J]. 计算机学报, 2013,36(9): 1765-1784.
|
|
LIN C , SU W B , MENG K ,et al. Cloud computing security:architecture,mechanism,and modeling[J]. Chinese Jourral of Cornputer, 2013,36(9): 1765-1784.
|
[3] |
SALINAS S , LEE M , COTY S ,et al. Cloud security report 2015[R]. Houston:Alter Logic, 2015.
|
[4] |
SIMOUS S , KALLONIATIS C , KAVAKLI E ,et al. Cloud forensics:identifying the major issues and challenges[J]. Lecture Notes in Computer Science, 2014,8484: 271-284.
|
[5] |
中国云计算安全政策与法律蓝皮书(2014)[EB/OL]. .
|
|
Cloud computing security policies and laws blue book of China(2014)[EB/OL]. .
|
[6] |
ARCHER J , CULLIANCE D , PUHLMANN N ,et al. Security guidance for critical areas of focus in cloud computing v3.0[R]. St Petersburg:Cloud Security Alliance, 2011.
|
[7] |
RUAN K , CARTHY J , KECHADI T ,et al. Cloud forensics definitions and critical criteria for cloud forensic capability:an overview of survey results[J]. Digital Investigation, 2013,10(1): 34-43.
|
[8] |
MELL P , GRANCE T . The NIST definition of cloud computing[R]. Gaithersburg:NIST, 2011.
|
[9] |
杨泽明, 刘宝旭, 许榕生 . 数字取证研究现状与发展态势[J]. 科研信息化技术与应用, 2015,6(1): 3-11.
|
|
YANG Z M , LIU B X , XU R S . Current situation and trend of digital forensics research[J]. e-Science Technology & Application, 2015,6(1): 3-11.
|
[10] |
PICHAN A , LAZARESCU M , SOH S T . Cloud forensics:technical challenges,solutions and comparative analysis[J]. Digital Investigation, 2015,13: 38-57.
|
[11] |
QUICK D , CHOO K K R . Impacts of increasing volume of digital forensic data:A survey and future research challenges[J]. Digital Investigation, 2014,11(4): 273-294.
|
[12] |
MARTINI B , CHOO K K R . Distributed filesystem forensics:XtreemFS as a case study[J]. Digital Investigation, 2014,11(4): 295-313.
|
[13] |
SIBIYA G , VENTER H S , FOGWILL T . Digital forensics in the cloud:the state of the art[C]// 2015 IST-Africa Conference. 2015: 1-9.
|
[14] |
ALEX M E , KISHORE R . Forensics framework for cloud computing[J]. Computers & Electrical Engineering, 2017,60(4): 193-205.
|
[15] |
ZAWOAD S , DUTTA A K , HASAN R . SecLaaS:secure logging-as-a-service for cloud forensics[C]// The 8th ACM SIGSAC Symposium on Information,Computer and Communications Security. 2013: 219-230.
|
[16] |
BIRK D , WEGENER C . Technical issues of forensic investigations in cloud computing environments[C]// The 2011 IEEE 6th International Workshop on Systematic Approaches to Digital Forensic Engineering. 2011: 1-10.
|
[17] |
VACCA J R . Computer forensics:computer crime scene investigation[M]. Hingham: Charles River MediaPress, 2013.
|
[18] |
GRISPOS G , STORER T , GLISSON W . Calm before the storm:the challenges of cloud computing in digital forensics[J]. International Journal of Digital Crime and Forensics, 2012,4(2): 28-48.
|
[19] |
TAYLOR M , HAGGERTY J , GRESTY D ,et al. Digital evidence in cloud computing systems[J]. Computer Law & Security Report, 2010,26(3): 304-308.
|
[20] |
ALQAHTANY S , CLARKE N , FURNELL S ,et al. A forensic acquisition and analysis system for IaaS[J]. Cluster Computing, 2016,19(1): 439-453.
|
[21] |
GRIER J . Detecting data theft using stochastic forensics[J].Digital Investigation,2011,8:S71-S77. Digital Investigation, 2011,8: S71-S77.
|
[22] |
PUTHAL D , SAHOO B P S , MISHRA S ,et al. Cloud Computing Features,Issues,and Challenges:A Big Picture[C]// The International Conference on Computational Intelligence & Networks, 2015: 116-123.
|
[23] |
ZAWOAD S , HASAN R , SKJELLUM A . OCF:an open cloud forensics model for reliable digital forensics[C]// 2015 IEEE 8th International Conference on Cloud Computing (CLOUD). 2015: 437-444.
|
[24] |
MARTINI B , CHOO K K R . An integrated conceptual digital forensic framework for cloud computing[J]. Digital Investigation, 2012,9(2): 71-80.
|
[25] |
谢亚龙, 丁丽萍, 林渝淇 ,等. ICFF:一种IaaS模式下的云取证框架[J]. 通信学报, 2013,34(5): 200-206.
|
|
XIE Y L , DING L P , LIN Y Q ,et al. ICFF:a cloud forensics framework under the IaaS model[J]. Journal on Communications, 2013,34(5): 200-206.
|
[26] |
RISTENPART T , TROMER E , SHACHAM H ,et al. Hey,you,get off of my cloud:exploring information leakage in third-party compute clouds[C]// ACM Conference on Computer and Communications Security. 2009: 199-212.
|
[27] |
FAHDI M A , CLARKE N L , LI F ,et al. A suspect-oriented intelligent and automated computer forensic analysis[J]. Digital Investigation, 2016,18: 65-76.
|
[28] |
Using graphviz as a library (cgraph version)[EB/OL]. .
|
[29] |
Documentation[EB/OL]. .
|
[30] |
REITH M , CARR C , GUNSCH G . An examination of digital forensic models[J]. International Journal of Digital Evidence, 2002,1(3): 1-12.
|
[31] |
丁丽萍, 王永吉 . 多维计算机取证模型研究[J]. 信息网络安全, 2005(11): 5-9.
|
|
DINH L P , WANG Y J . Multi-dimension forensics model research[J]. NeTINFO Security, 2005(11): 5-9.
|
[32] |
TRENWITH P M , VENTER H S . A digital forensic model for providing better data provenance in the cloud[C]// The Information Security for South Africa. 2014: 1-6.
|
[33] |
周刚 . 云计算环境中面向取证的现场迁移技术研究[D]. 武汉:华中科技大学, 2011.
|
|
ZHOU G . Research on forensics-oriented site migration technology in cloud computing environment[D]. Wuhan:Huazhong University of Science and Technology, 2011.
|
[34] |
SIMOUS S , KALLONIATIS C , MOURATIDIS H ,et al. Towards the development of a cloud forensics methodology:a conceptual model[J]. Lecture Notes in Business Information Processing, 2015,215: 470-481.
|
[35] |
LIM S H . Implementation of MapReduce model for disk forensic computing analysis[J]. Lecture Notes in Electrical Engineering, 2012,164: 577-584.
|
[36] |
POVAR D , SAIBHARATH , GEETHAKUMARI G . Real-time digital forensic triaging for cloud data analysis using MapReduce on Hadoop framework[J]. International Journal of Electronic Security & Digital Forensics, 2014,7(2): 119-133.
|