• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Xuehua, Ding Liping, Liu Wenmao, Zheng Tao, Li Yanfeng, Wu Jingzheng. A Cloud Forensics Method Based on SDS and Cloud Forensics Trend Analysis[J]. Journal of Computer Research and Development, 2019, 56(10): 2262-2276. DOI: 10.7544/issn1000-1239.2019.20190394
Citation: Liu Xuehua, Ding Liping, Liu Wenmao, Zheng Tao, Li Yanfeng, Wu Jingzheng. A Cloud Forensics Method Based on SDS and Cloud Forensics Trend Analysis[J]. Journal of Computer Research and Development, 2019, 56(10): 2262-2276. DOI: 10.7544/issn1000-1239.2019.20190394

A Cloud Forensics Method Based on SDS and Cloud Forensics Trend Analysis

More Information
  • Published Date: September 30, 2019
  • With the development and popularization of cloud computing, the security situation of cloud computing environment is getting worse. Cloud forensics is of great significance for safeguarding the cloud computing security. The current cloud forensics technology research is at an early stage, and cloud forensics is faced with problems such as lack of digital evidence integrity, high forensics overhead and low intelligence. Therefore, an intelligent cloud forensics method based on SDS (software defined security) and cloud forensics trend analysis is proposed to mitigate some of these problems. Firstly, a cloud forensics architecture based on software defined security is proposed to realize collaborative real-time forensics between cloud network and cloud computing platform. Secondly, a cloud forensics trend analysis algorithm based on the HMM (hidden Markov model) is proposed to realize intelligent forensics strategy decision-making and forensics resource scheduling in the cloud forensics architecture. The experimental results show that, compared with the separate network forensics method and cloud computing platform forensics method, the forensics capacity of this method increases to 91.6%, and the forensics overhead of this method is in between, achieving a better effect between forensics capability and forensics overhead. This method has some referential significance for cloud service providers to provide cloud forensics service.
  • Related Articles

    [1]Cui Chaoyuan, Li Yonggang, Wu Yun, Wang Licheng. A Memory Forensic Method Based on Hidden Event Trigger Mechanism[J]. Journal of Computer Research and Development, 2018, 55(10): 2278-2290. DOI: 10.7544/issn1000-1239.2018.20180405
    [2]Yi Peng, Zhou Qiao, Men Haosong. Dynamic Social Network Community Detection Algorithm Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2017, 54(11): 2611-2619. DOI: 10.7544/issn1000-1239.2017.20160741
    [3]Tang Wanning, Wang Mingwen, Wan Jianyi. Markov Network Retrieval Model Based on Document Cliques[J]. Journal of Computer Research and Development, 2014, 51(10): 2248-2254. DOI: 10.7544/issn1000-1239.2014.20130343
    [4]Jiang Changhao, Zhang Min, Gao Bin, Liu Yiqun, Ma Shaoping. Advertiser Status Modeling in Sponsored Search[J]. Journal of Computer Research and Development, 2013, 50(12): 2621-2628.
    [5]Wu Caihua, Liu Juntao, Peng Shirui, Li Haihong. Deriving Markov Chain Usage Model from UML Model[J]. Journal of Computer Research and Development, 2012, 49(8): 1811-1819.
    [6]Zhang Zhan, Liu Guangjie, Dai Yuewei, Wang Zhiquan. A Self-Adaptive Image Steganography Algorithm Based on Cover-Coding and Markov Model[J]. Journal of Computer Research and Development, 2012, 49(8): 1668-1675.
    [7]Dong Hao, Liu Yuanning, Zhang Hao, Wang Gang. A Method of RNA Secondary Structure Prediction Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2012, 49(4): 812-817.
    [8]Zhao Jing, Huang Houkuan, and Tian Shengfeng. Protocol Anomaly Detection Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2010, 47(4): 621-627.
    [9]Wang Junwen, Liu Guangjie, Dai Yuewei, Zhang Zhan, and Wang Zhiquan. Image Forensics for Blur Detection Based on Nonsubsampled Contourlet Transform[J]. Journal of Computer Research and Development, 2009, 46(9): 1549-1555.
    [10]Duan Jiangjiao, Xue Yongsheng, Lin Ziyu, Wang Wei, Shi Baile. A Novel Hidden Markov Model-Based Hierarchical Time-Series Clustering Algorithm[J]. Journal of Computer Research and Development, 2006, 43(1): 61-67.

Catalog

    Article views (1273) PDF downloads (469) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return