[1] |
中国信息通信研究院.云计算白皮书[R]. 北京:中国信息通信研究院, 2016.
|
|
China Academy of Information and Communication Technology.>云计算白皮书>[R]. White Papers of Cloud Computing[R]. Beijing:China Academy of Information and Communication Technology, 2016.
|
[2] |
张玉清, 王晓菲, 刘雪峰 ,等. 云计算环境安全综述[J]. 软件学报, 2016,27(6): 1328-1348.
|
|
ZHANG Y Q , WANG X F , LIU X F ,et al. Survey on cloud computing security[J]. Journal of Software, 2016,27(6): 1328-1348.
|
[3] |
CHANG V , RAMACHANDRAN M . Towards achieving data security with the cloud computing adoption framework[J]. IEEE Trans Services Computing, 2016,9(1): 138-151.
|
[4] |
MARTINI B , CHOO K K R . Cloud storage forensics:owncloud as a case study[J]. Digital Investigation, 2013,10(4): 287-299.
|
[5] |
LI Y , GAI K , QIU L ,et al. Intelligent cryptography approach for secure distributed big data storage in cloud computing[J]. Information Sciences, 2017,387: 103-115.
|
[6] |
ALVA A , CALEFF O , ELKINS G ,et al. The Notorious nine:cloud computing top threats in 2013[R]. Cloud Security Alliance, 2013.
|
[7] |
BROOK J M , FIELD S , SHACKLEFORD D ,et al. The treacherous 12 - cloud computing top threats in 2016[R]. Seattle:Cloud Security Alliance, 2016.
|
[8] |
中国云计算安全政策与法律工作组.中国云计算安全政策与法律蓝皮书(2016)[R]. 上海:中国云计算安全政策与法律工作组, 2016.
|
|
Cloud Computing Security Policies and Laws Group. Cloud computing security policies and laws blue book(2016)[R]. Shanghai:Cloud Computing Security Policies and Laws Group, 2016.
|
[9] |
STOLFO S J , SALEM M B , KEROMYTIS A D . Fog computing:mitigating insider data theft attacks in the cloud[C]// IEEE Symposium on Security and Privacy Workshops. 2012: 125-128.
|
[10] |
SRIRAM M , PATEL V , HARISHMA D ,et al. A hybrid protocol to secure the cloud from insider threats[C]// IEEE International Conference on Cloud Computing in Emerging Markets. 2014: 1-5.
|
[11] |
NIKOLAI J , WANG Y . A system for detecting malicious insider data theft in IaaS cloud environments[C]// 2016 IEEE Global Communications Conference (GLOBECOM). 2016: 1-6.
|
[12] |
SUBASHINI S , KAVITHA V . A survey on security issues in service delivery models of cloud computing[J]. Journal of Network & Computer Applications, 2011,34(1): 1-11.
|
[13] |
ROCHA F , CORREIA M . Lucy in the sky without diamonds:Stealing confidential data in the cloud[C]// IEEE/IFIP International Conference on Dependable Systems and Networks Workshops. 2011: 129-134.
|
[14] |
PITROPAKIS N , LYVAS C , LAMBRINOUDAKIS C . The greater the power,the more dangerous the abuse:facing malicious insiders in the cloud[J]. Cloud Computing 2017, 2017: 156-161.
|
[15] |
MARTINI B , CHOO K K R . Distributed filesystem forensics:XtreemFS as a case study[J]. Digital Investigation, 2014,11(4): 295-313.
|
[16] |
GRIER J . Detecting data theft using stochastic forensics[J]. Digital Investigation, 2011,8(8): 71-77.
|
[17] |
PATEL P C , SINGH U . A novel classification model for data theft detection using advanced pattern mining[J]. Digital Investigation, 2013,10(4): 385-397.
|
[18] |
SHVACHKO K , KUANG H , RADIA S ,et al. The hadoop distributed file system[C]// 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST). 2010: 1-10.
|
[19] |
GAO Y , LI B . A forensic method of efficient file extraction in HDFS based on three-level mapping[J]. Wuhan University Journal of Natural Sciences, 2017,22(2): 114-126.
|
[20] |
WHITE T . hadoop:The definitive guide(3th Edition)[M]. Sebastopol: O'Reilly Media,IncPress, 2015.
|
[21] |
BARHAM P , DRAGOVIC B , FRASER K ,et al. Xen and the art of virtualization[C]// ACM SIGOPS Operating Systems Review. 2003: 164-177.
|
[22] |
MACKAY E B , CHALLENOR P G , BAHAJ A S . A comparison of estimators for the generalised Pareto distribution[J]. Ocean Engineering, 2011,38(11): 1338-1346.
|