메뉴 건너뛰기




Volumn , Issue , 2014, Pages

A digital forensic model for providing better data provenance in the cloud

Author keywords

annotations; bilinear pairing technique; chain of custody; Cloud Computing; data provenance; Digital Forensic Investigation; Digital Forensics

Indexed keywords

CLOUD COMPUTING; COMPUTER CRIME; DIGITAL DEVICES; DIGITAL FORENSICS; ELECTRONIC CRIME COUNTERMEASURES; ELECTRONIC MAIL; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84913610840     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISSA.2014.6950489     Document Type: Conference Paper
Times cited : (9)

References (27)
  • 1
    • 84938064472 scopus 로고    scopus 로고
    • Department of Electrical and Computer Engineering and Information Assurance Center Iowa State University December
    • G. Yong Ph.D, "Digital forensics: Research challenges and open problems," in Department of Electrical and Computer Engineering and Information Assurance Center Iowa State University, December 2007.
    • (2007) Digital Forensics: Research Challenges and Open Problems
    • Yong, G.1
  • 2
    • 84913621636 scopus 로고    scopus 로고
    • Technical issues of forensic investigations in cloud computing environments
    • Horst Goertz Institute for IT Security Bochum, Germany, January 2011
    • D. Birk and C. Wegener, "Technical issues of forensic investigations in cloud computing environments," in Ruhr-University Bochum, Horst Goertz Institute for IT Security Bochum, Germany, January 2011.
    • Ruhr-University Bochum
    • Birk, D.1    Wegener, C.2
  • 11
    • 78649514344 scopus 로고    scopus 로고
    • A new data integrity verification mechanism for saas
    • Springer
    • Y. Shi, K. Zhang, and Q. Li, "A new data integrity verification mechanism for saas," in Web Information Systems and Mining. Springer, 2010, pp. 236-243.
    • (2010) Web Information Systems and Mining , pp. 236-243
    • Shi, Y.1    Zhang, K.2    Li, Q.3
  • 14
    • 37149007674 scopus 로고    scopus 로고
    • Full-domain subgroup hiding and constantsize group signatures
    • Springer
    • X. Boyen and B. Waters, "Full-domain subgroup hiding and constantsize group signatures," in Public Key Cryptography-PKC 2007. Springer, 2007, pp. 1-15.
    • (2007) Public Key Cryptography-PKC , vol.2007 , pp. 1-15
    • Boyen, X.1    Waters, B.2
  • 16
    • 0019009078 scopus 로고
    • Osi reference model-The iso model of architecture for open systems interconnection
    • H. Zimmermann, "Osi reference model-the iso model of architecture for open systems interconnection," Communications, IEEE Transactions on, vol. 28, no. 4, pp. 425-432, 1980.
    • (1980) Communications IEEE Transactions on , vol.28 , Issue.4 , pp. 425-432
    • Zimmermann, H.1
  • 18
    • 0020588929 scopus 로고
    • X 25 and related recommendations in ibm products
    • G. A. Deaton Jr and R. O. Hippert Jr, "X. 25 and related recommendations in ibm products," IBM systems journal, vol. 22, no. 1.2, pp. 11-29, 1983.
    • (1983) IBM Systems Journal , vol.22 , Issue.12 , pp. 11-29
    • Deaton, G.A.1    Hippert, R.O.2
  • 20
    • 84890819466 scopus 로고    scopus 로고
    • Cloud computing: Another digital forensic challenge
    • October
    • J. J. Barbara, "Cloud computing: Another digital forensic challenge," Digital Forensic Investigator News, October 2009.
    • (2009) Digital Forensic Investigator News
    • Barbara, J.J.1
  • 26
    • 84913622615 scopus 로고    scopus 로고
    • Spatial data transfer standard (sdts
    • Springer
    • P. Altheide, "Spatial data transfer standard (sdts)," in Encyclopedia of GIS. Springer, 2008, pp. 1087-1095.
    • (2008) Encyclopedia of GIS , pp. 1087-1095
    • Altheide, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.