[1] |
NIST cloud computing forensic science chanllengs[EB/OL]. .
|
[2] |
RUAN K , CARTHY J , KECHADI T ,et al. Cloud forensics[C]// IFIP International Conference on Digital Forensics. 2011: 35-46.
|
[3] |
Mapping the forensic standard ISO/IEC 27037 to Cloud Computing[EB/OL]. .
|
[4] |
RUAN K , CARTHY J , KECHADI T ,et al. Cloud forensics definitions and critical criteria for cloud forensic capability:An overview of survey results[J]. Digital Investigation, 2013,10(1): 34-43.
|
[5] |
ZARGARI S , BENFORD D . Cloud forensics:concepts,issues,and challenges[C]// The third Conference on Emerging Intelligent Data and Web Technologies (EIDWT). 2012: 236-243.
|
[6] |
TAYLOR M , HAGGERTY J , GRESTY D ,et al. Forensic investigation of cloud computing systems[J]. Network Security, 2011(3): 4-10.
|
[7] |
[EB/OL]. .
|
[8] |
[EB/OL]. .
|
[9] |
ZAWOAD S , HASAN R . Cloud forensics:a meta-study of challenges,approaches,and open problems[EB/OL]. .
|
[10] |
NANDA S , HANSEN R A . Forensics as a service:three-tier architecture for cloud based forensic analysis[C]// The 15th International Symposium on Parallel and Distributed Computing (ISPDC). 2016: 178-183.
|
[11] |
谢亚龙, 丁丽萍, 林渝淇 ,等. ICFF:一种IaaS 模式下的云取证框架[J]. 通信学报, 2013,34(5): 200-206.
|
|
XIE Y L , DING L P , LIN Y Q ,et al. ICFF:a cloud forensics framework under the IaaS model[J]. Journal on Communications, 2013,34(5): 200-206.
|
[12] |
周刚 . 云计算环境中面向取证的现场迁移技术研究[D]. 武汉:华中科技大学, 2011.
|
|
ZHOU G . Research on forensics-oriented site migration technology in cloud computing environment[D]. Wuhan:Huazhong University of Science and Technology, 2011.
|
[13] |
LEE J , UN S . Digital forensics as a service:a case study of forensic indexed search[C]// The International Conference on ICT Convergence (ICTC). 2012: 499-503.
|
[14] |
WEN Y , MAN X , LE K ,et al. Forensics-as-a-service (faas):computer forensic workflow management and processing using cloud[C]// The fifth International Conferences on Pervasive Patterns and Applications. 2013: 1-7.
|
[15] |
SANG T , . A log based approach to make digital forensics easier on cloud computing[C]// Intelligent System Design and Engineering Applications (ISDEA). 2013: 91-94.
|
[16] |
田庆宜, 王琳, 黄道丽 . Vsphere 架构私有云取证方法研究及其实践[J]. 信息网络安全, 2011,9: 44-46.
|
|
TIAN Q Y , WANG L , HUANG D L . Research and practice of VSPhere architecture private cloud forensics methods[J]. Netinfo Security, 2017,30(1): 31-38.
|
[17] |
吴松洋, 张熙哲, 王旭鹏 ,等. 基于 Hadoop 的高效分布式取证:原理与方法[J]. 电信科学, 2017,30(1): 31-38.
|
|
WU S Y , ZHANG X Z , WANG X P ,et al. Highly distributed distributed forensics based on hadoop:principles and methods[J]. Telecommunications Science, 2017,30(1): 31-38.
|
[18] |
ZHOU M , ZHANG R , XIE W ,et al. Security and privacy in cloud computing:a survey[C]// The sixth International Conference on Semantics Knowledge and Grid (SKG). 2010: 105-112.
|
[19] |
BURNSIDE R S . The electronic communications privacy act of 1986:the challenge of applying ambiguous statutory language to intricate telecommunication technologies[J]. Rutgers Computer &Technology, 1987,13:451. 31-38.
|
[20] |
SHELDON J . Fair credit reporting act[J]. National Consumer Law Center Consumer Credit & Sales Legal Practice, 1994,65(2): 595-609.
|
[21] |
EVideo Privacy Protection Act[EB/OL]. .
|
[22] |
GELLMAN R , . Privacy in the clouds:risks to privacy and confidentiality from cloud computing[C]// The World privacy forum. 2012.
|
[23] |
CAVOUKIAN A . Privacy in the clouds[J]. Identity in the Information Society, 2008,1(1): 89-108.
|
[24] |
PEARSON S , . Taking account of privacy when designing cloud computing services[C]// The 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing. 2009: 44-52.
|
[25] |
PEARSON S , CHARLESWORTH A . Accountability as a way forward for privacy protection in the cloud[C]// IEEE International Conference on Cloud Computing. 2009: 131-144.
|
[26] |
SADEGHI A R , SCHNEIDER T , WINANDY M . Token-based cloud computing[C]// The International Conference on Trust and Trustworthy Computing. 2010: 417-429.
|
[27] |
WANG C , REN K , WANG J . Secure and practical outsourcing of linear programming in cloud computing[C]// INFOCOM. 2011: 820-828.
|
[28] |
XU Z , WANG C , REN K ,et al. Proof-carrying cloud computation:the case of convex optimization[J]. IEEE Transactions on Information Forensics and Security, 2014,9(11): 1790-1803.
|
[29] |
ITANI W , KAYSSI A , CHEHAB A . Privacy as a service:privacy-aware data storage and processing in cloud computing architectures[C]// Dependable,Autonomic and Secure Computing. 2009: 711-716.
|
[30] |
SQUICCIARINI A , SUNDARESWARAN S , LIN D . Preventing information leakage from indexing in the cloud[C]// The 3rd International Conference on Cloud Computing (CLOUD). 2010: 188-195.
|
[31] |
PEARSON S , SHEN Y , MOWBRAY M . A privacy manager for cloud computing[C]// IEEE International Conference on Cloud Computing. 2009: 90-106.
|
[32] |
MOWBRAY M , PEARSON S . A client-based privacy manager for cloud computing[C]// The Fourth International ICST Conference on Communication System Software and Middleware. 2009:5.
|