Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (9): 13-23.doi: 10.11959/j.issn.2096-109x.2017.00194

• Papers • Previous Articles     Next Articles

Cloud computing forensic model

Yuan-zhao GAO1,2,Xue-juan LI3,Bing-long LI1,2(),Xi-xi WU4   

  1. 1 Information Engineering University,Zhengzhou 450001,China
    2 State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China
    3 Audit Department of Henan Polytechnic University,Jiaozuo 454010,China
    4 Baicheng Weapon Testing Center,Baicheng 137000,China
  • Revised:2017-09-04 Online:2017-09-01 Published:2017-10-18
  • Supported by:
    The National High Technology Research and Development Program of China (863 Program)(2015AA01600);The National Natural Science Foundation of China(60903220)

Abstract:

Aiming at the main challenges facing cloud forensics,cloud characteristics were analyzed and a cloud forensic model was proposed.In the model,the deployment of persistent forensic readiness service,multi-round identification strategy based on “iteration” and multi-level evidence location method for distributed file system,“data isolation” and “on-demand collection” strategies,and the establishment of comprehensive evidence analysis platform based on cloud resources were presented.Finally,the validity of the model was analyzed combining the forensic scene in the cloud environment.

Key words: cloud computing, cloud forensics, forensic model, forensic strategy, forensic method

CLC Number: 

No Suggested Reading articles found!