Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (1): 26-35.doi: 10.11959/j.issn.2096-109x.2018004

• Papers • Previous Articles     Next Articles

Research on forensics of privacy violations in cloud environment

Weifeng LI,Weizhong QIANG(),Weiming LI,Deqing ZOU   

  1. School of Computer Science &Technology,Huazhong University of Science and Technology,Wuhan 430074,China
  • Revised:2018-01-02 Online:2018-01-01 Published:2018-02-09
  • Supported by:
    The National Key Research & Development (R&D) Plan of China(2017YFB0802205)

Abstract:

Cloud computing is the mainstream information system technology,however,privacy protection of user and privacy violation tracking and forensics in the cloud computing environment have always been a challenge.The current mainstream cloud computing forensics system and standard are not mature and complete,and are far from the target of computer forensics.With the focus on privacy violation and forensics in the cloud environment,status and challenges of cloud forensics and cloud privacy violation were reported firstly.Then,the research content and technical route of privacy forensics in the cloud environments were analyzed.Finally,a specific privacy violation forensics system for cloud environments was presented.

Key words: cloud computing, cloud forensics, cloud evidence analysis, privacy violation

CLC Number: 

No Suggested Reading articles found!