Research on forensics of privacy violations in cloud environment
Cloud computing is the mainstream information system technology,however,privacy protection of user and privacy violation tracking and forensics in the cloud computing environment have always been a challenge.The current mainstream cloud computing forensics system and standard are not mature and comp...
Saved in:
Main Authors: | Weifeng LI, Weizhong QIANG, Weiming LI, Deqing ZOU |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-01-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018004 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Cloud computing forensic model
by: Yuan-zhao GAO, et al.
Published: (2017-09-01) -
ICFF: a cloud forensics framework under the IaaS model
by: Ya-long XIE, et al.
Published: (2013-05-01) -
Research on outsourcing of digital image forensics based on privacy preserving
by: Bing-wen FENG, et al.
Published: (2016-08-01) -
A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security
by: Shaohui Wang, et al.
Published: (2012-09-01) -
Privacy cloud storage scheme based on fog computing
by: Jiyuan ZHOU, et al.
Published: (2019-03-01)