|Table of Contents|

Domain feature oriented model for cloud forensics


Research Field:
Publishing date:


Domain feature oriented model for cloud forensics
Wang JianTang Zhenmin
School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
cloud forensics object constraint language digital evidence process models domain feature
TP393.09; D918.2
The digital forensic process is becoming more and more complicated with the introduction of cloud computing.In order to ensure that the cloud digital evidence provided to the court as the trial basis,an extensible feature-based semantic model using object constraint language(OCL)and feature oriented domain analysis(FODA)for cloud digital forensics data is proposed.First,the presentation models of the feature,the feature space and the digital forensic feature space are defined respectively.Then,the association and dependency relations among the features of the forensic data are classified into four types:self constraint,father-son constraint,explicit constraint and implicit constraint.The four kinds of constraints are formally described by the object constraint language,which provides an accurate semantic support for such a model.Therefore,a feature tree can be built with semantic logical relation in order to get the overall semantic description of features in the forensic domain of digital data.It not only solves the presentation problem of digital forensics,but also solves the collision detection problem of static properties,which achieves static properties of electronic data.


[1] 金仙力,马华东.基于OCL的服务构建特征语义描述模型[J].计算机研究与发展,2007,44(12):2112-2121.
Jin Xianli,Ma Huadong.A semantic description model of features for SerVice component using OCL[J].Journal of Gomputer Reseach and Development,2007,44(12):2112-2121.
[3]Streitferdt D,Riebisch M,Philippow I.Details of formalized relations in feature models using OCL[C]//Proceedings of ECBS 2003.Hawaii,USA:IEEE Computer Society,2003:297-304.
[4]Shao Zehui,Ding Qiufeng,Jin Xianli,et al.A static semantic model for trusted forensics using OCL[J].Future Information Technology,Lecture Notes in Electrical Engineering,2014,276:259-268.
[5]Simson L G.Digital forensics research:the next 10 years[J].Digital Investigation,2010(7):64-73.
Luo Junzhou,Jin Jiahui,Song Aibo,et al.Cloud computing:architecture and key technologies[J].Journal on Communicaitons,2011,32(7):3-21.
Feng Dengguo,Zhang Min,Zhang Yan,et al.Study on cloud computing security[J].Journal of Software,2011,21(1):71-83.
[9]Wu J Z,Ding L P,Lin Y Q,et al.XenPump:a new method to mitigate timing channel in cloud computing[C]//IEEE 5th Conference on Cloud Computing.Hawaii,USA:IEEE Computer Society,2012:678-685.
[10]Casey E.The increasing need for automation and validation in digital forensics[J].Digital Investigation,2011,7(3-4):103-104.
Mai Yonghao,Liu Zhijun,Xiang Dawei,et al.Criterion of computer forensics systematic process[J].Telecommunications Science,2010(S2):12-15.
[12]OCLE Tool.http://lci.cs.ubbcluj.ro/OCLE/index.htm.


Last Update: 2016-06-30