计算机科学 ›› 2015, Vol. 42 ›› Issue (Z11): 348-351.
董振兴,张青,陈龙
DONG Zhen-xing, ZHANG Qing and CHEN Long
摘要: 越来越多的用户使用云存储服务来存储数据,但利用云存储服务存储违法信息、盗取公司机密信息等违法案例也逐渐增多。如何提取完整、可靠的证据信息以证明云存储服务访问行为成为一个迫切需要解决的问题。以360云存储服务为例,分析使用浏览器、客户端软件访问云存储后残留痕迹的存储规律性,提出了一种用户行为取证分析方法。该方法通过把日志、历史痕迹等相互关联来重构用户行为时间线,进而分析用户的数据操作行为规律。该方法的取证调查思路、方法也适用于当前广泛使用的其他云存储服务。
[1] Shams Z,Amit K D,Ragib H.SecLaaS:secure logging-as-a-service for cloud forensics[C]∥ASIA CCS’13 Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security Table of Contents.New York:ACM,2013:219-230 [2] Zawoad S,Hasan R.I have the proof:providing proofs of past data possession in cloud forensics[C]∥Cyber Security.Washing-ton,DC,IEEE,2012:75-82 [3] 谢亚龙,丁丽萍,林渝淇,等.ICFF:一种 IaaS 模式下的云取证框架[J].通信学报,2013,34(5):200-206 [4] Sang Ting.A log based approach to make digital forensics easier on cloud computing[C]∥ 2013 Third International Conference on Intelligent System Design and Engineering Applications(ISDEA).Hong Kong,IEEE,2013:91-94 [5] Darren Q,Kim-Kwang R C.Digital droplets:Microsoft SkyDrive forensic data remnants[J].Future Generation Computer Systems,2013,29(6):1378-1394 [6] Fabio M,Gianluigi M,Simone T.A case study on digital forensics in the cloud[C]∥2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery(CyberC).Sanya,IEEE,2012:111-116 [7] Hale J S.Amazon cloud drive forensic analysis[J].Digital Inves-tigation,2013,10(3):259-265 [8] Quick D,Choo K-K R.Forensic collection of cloud storage data:Does the act of collection result in changes to the data or its metadata[J].Digital Investigation,2013,10(3):266-277 [9] Quick D,Choo K-K R.Dropbox analysis:data remnants on user machines[J].Digital Investigation,2013,10(1):3-18 [10] Chunga H,Parka J,Leea S,et al.Digital forensic investigation of cloud storage service[J].Digital Investigation,2012,9(2):81-95 |
No related articles found! |
|