|Table of Contents|

Domain feature oriented model for cloud forensics

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2016年04期
Page:
477-
Research Field:
Publishing date:

Info

Title:
Domain feature oriented model for cloud forensics
Author(s):
Wang JianTang Zhenmin
School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China
Keywords:
cloud forensics object constraint language digital evidence process models domain feature
PACS:
TP393.09; D918.2
DOI:
10.14177/j.cnki.32-1397n.2016.40.04.017
Abstract:
The digital forensic process is becoming more and more complicated with the introduction of cloud computing.In order to ensure that the cloud digital evidence provided to the court as the trial basis,an extensible feature-based semantic model using object constraint language(OCL)and feature oriented domain analysis(FODA)for cloud digital forensics data is proposed.First,the presentation models of the feature,the feature space and the digital forensic feature space are defined respectively.Then,the association and dependency relations among the features of the forensic data are classified into four types:self constraint,father-son constraint,explicit constraint and implicit constraint.The four kinds of constraints are formally described by the object constraint language,which provides an accurate semantic support for such a model.Therefore,a feature tree can be built with semantic logical relation in order to get the overall semantic description of features in the forensic domain of digital data.It not only solves the presentation problem of digital forensics,but also solves the collision detection problem of static properties,which achieves static properties of electronic data.

References:

[1] 金仙力,马华东.基于OCL的服务构建特征语义描述模型[J].计算机研究与发展,2007,44(12):2112-2121.
Jin Xianli,Ma Huadong.A semantic description model of features for SerVice component using OCL[J].Journal of Gomputer Reseach and Development,2007,44(12):2112-2121.
[2]周刚.云计算环境中面向取证的现场迁移技术研究[D].武汉:华中科技大学计算机科学与技术学院,2011.
[3]Streitferdt D,Riebisch M,Philippow I.Details of formalized relations in feature models using OCL[C]//Proceedings of ECBS 2003.Hawaii,USA:IEEE Computer Society,2003:297-304.
[4]Shao Zehui,Ding Qiufeng,Jin Xianli,et al.A static semantic model for trusted forensics using OCL[J].Future Information Technology,Lecture Notes in Electrical Engineering,2014,276:259-268.
[5]Simson L G.Digital forensics research:the next 10 years[J].Digital Investigation,2010(7):64-73.
[6]罗军舟,金嘉晖,宋爱波,等.云计算:体系架构与关键技术[J].通信学报,2011,32(7):3-21.
Luo Junzhou,Jin Jiahui,Song Aibo,et al.Cloud computing:architecture and key technologies[J].Journal on Communicaitons,2011,32(7):3-21.
[7]黄勤龙.云计算平台下数据安全与版权保护技术研究[D].北京邮电大学计算机科学与技术学院,2014.
[8]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,21(1):71-83.
Feng Dengguo,Zhang Min,Zhang Yan,et al.Study on cloud computing security[J].Journal of Software,2011,21(1):71-83.
[9]Wu J Z,Ding L P,Lin Y Q,et al.XenPump:a new method to mitigate timing channel in cloud computing[C]//IEEE 5th Conference on Cloud Computing.Hawaii,USA:IEEE Computer Society,2012:678-685.
[10]Casey E.The increasing need for automation and validation in digital forensics[J].Digital Investigation,2011,7(3-4):103-104.
[11]麦永浩,刘志军,向大为,等.计算机取证的系统化流程规范[J].电信科学,2010(增2):12-15.
Mai Yonghao,Liu Zhijun,Xiang Dawei,et al.Criterion of computer forensics systematic process[J].Telecommunications Science,2010(S2):12-15.
[12]OCLE Tool.http://lci.cs.ubbcluj.ro/OCLE/index.htm.

Memo

Memo:
-
Last Update: 2016-06-30