期刊文献+

云计算环境与电子取证的研究 被引量:2

Research on Cloud Computing Environment and Electronic Forensics
下载PDF
导出
摘要 近年来云计算和云应用悄然走进了人们的生活,云计算的迅猛发展不仅给社会带来了客观的经济效益,同时向云计算平台提出了云安全的巨大挑战。目前,云计算技术存在云计算不能得到明确的限制、没有安全规定的对应接口、云服务商工作人员没有明确的操作限制、共享存在隐患、数据隐私存在泄漏隐患、登录信息存在泄漏隐患等一系列问题。虽然云计算环境为电子取证带来了大量难题,但还是要遵循侦查取证的基本原理对云环境下的电子取证进行研究。云平台的技术特点与电子取证相结合的方法,最终得到云取证。云环境中可提供大规模的节点进行分布式数据处理,能够提高实时处理能力。利用云计算解决取证的相关技术已经成为信息技术和电子取证的发展趋势。主要研究和探讨云计算的大数据处理能力,并介绍在取证工作中所运用到的云取证技术和分布式kmeans数据挖掘算法。 At present, cloud computing technology, has the following challenges, cloud computing can not be explicitly limited, there are no security requirements corresponding interface, cloud service provider staff does not have explieit operational restrictions, there are hidden dangers, the existence of data privacy risks of leakage, login information leakage and a series of problems. Although the cloud computing environment for electronic evidence has brought a lot of problems, but it still has to follow the basic principles of investigation and evidence collection under the cloud envi- ronment of electronic evidence research. The technical characteristics of cloud platform and the electronic evidence has been combined,and ultimately get cloud evidence. Large-scale nodes can be distributed in the cloud environment for data processing, which can improve real-time processing capabilities. The use of cloud computing to solve the relevant technical problems of evidence has become the development trend of information technology and electronic evidence. This paper mainly studied and discussed the large data processing capability of cloud computing, and introduced cloud forensics and distributed k-means data mining algorithms used in forensics work.
作者 王雅实 王立梅 WANG Ya-shi WANG Li-mei(Department of Science and Technology, China University of Political Science and Law, Beijing 100027, China)
出处 《计算机科学》 CSCD 北大核心 2016年第B12期152-155,173,共5页 Computer Science
基金 本文受国家自然科学基金(11501575),中国政法大学青年教师学术创新团队(2014CXTD01),中国政法大学人文社科项目(12ZFQll001)资助.
关键词 云计算 电子取证 云取证 Cloud computing, Electronic forensics, Cloud forensics
  • 相关文献

参考文献3

二级参考文献69

  • 1SkoudisEd.反击黑客[M].北京:机械工业出版社,2002..
  • 2Reuben J S. A survey on virtual machine security[R]. Helsinki University of Technology,October 2007.
  • 3Kirch J. Virtual machine security guidelines[R]. The center for Internet Security,September 2007.
  • 4Zhang Shu-hui, Wang Lian-hai, Zhang Lei. Extracting windows registry information from physical memory [C] // International Conference on Computer Research and Development (ICCRD). 2011,2:85-89.
  • 5Wang Lian-hai, Zhang Rui-chao, Zhang Shu-hui. A Model of Computer Live Forensics Based on Physical Memory Analysis [C]//ICISE ' 09. Dec. 2009.
  • 6Zhang Rui-chao, Wang Lian-hai, Zhang Shu-hui. Windows Memory Analysis Based on KPCR[C]// 2009 Fifth International Conference on Information Assurance and Security. 2009: 677- 680.
  • 7丁丽萍.云计算环境下隐蔽信道分析关键技术研究[R].北京:中国科学院软件研究所,2011.
  • 8CERT/CC Coordination Center.Trends in Denial of Service Attack Technology.October 2001
  • 9Honig A.,Howard A.,Eskin E.,Stolfo S..Adaptive model generation:An architecture for the deployment of data miningbased intrusion detection systems.Data Mining for Security Applications,Kluwer,2002
  • 10韩家炜等.数据挖掘-概念与技术.北京:高等教育出版社,2001

共引文献64

同被引文献40

引证文献2

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部