A. Odebade, T. Welsh, Siyakha N. Mthunzi, E. Benkhelifa
{"title":"通过基于资源的隐私保护活动归属来减轻云中的反取证","authors":"A. Odebade, T. Welsh, Siyakha N. Mthunzi, E. Benkhelifa","doi":"10.1109/SDS.2017.7939155","DOIUrl":null,"url":null,"abstract":"The multi-tenant Cloud environment creates a plethora of both technical and legal difficulties for digital forensics. Digital forensics typically relies on the analysis of evidence images or residual data. Due to the distributed nature of cloud environments can cause the required dataset to scale rapidly. When coupled with diversely heterogeneous environments, the widespread uptake of anti-forensic data and encryption, privacy requirements and a non-standardised architecture across Cloud Service Providers (CSPs), attribution of any activity for a forensic investigation becomes a tedious task. This paper presents an architecture agnostic, privacy-preserving solution to reducing the digital forensics target search space of a investigation within cloud and edge computing environments which will leverage standard metering and network logs for efficient activity attribution.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Mitigating anti-forensics in the Cloud via resource-based privacy preserving activity attribution\",\"authors\":\"A. Odebade, T. Welsh, Siyakha N. Mthunzi, E. Benkhelifa\",\"doi\":\"10.1109/SDS.2017.7939155\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The multi-tenant Cloud environment creates a plethora of both technical and legal difficulties for digital forensics. Digital forensics typically relies on the analysis of evidence images or residual data. Due to the distributed nature of cloud environments can cause the required dataset to scale rapidly. When coupled with diversely heterogeneous environments, the widespread uptake of anti-forensic data and encryption, privacy requirements and a non-standardised architecture across Cloud Service Providers (CSPs), attribution of any activity for a forensic investigation becomes a tedious task. This paper presents an architecture agnostic, privacy-preserving solution to reducing the digital forensics target search space of a investigation within cloud and edge computing environments which will leverage standard metering and network logs for efficient activity attribution.\",\"PeriodicalId\":326125,\"journal\":{\"name\":\"2017 Fourth International Conference on Software Defined Systems (SDS)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Fourth International Conference on Software Defined Systems (SDS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SDS.2017.7939155\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Fourth International Conference on Software Defined Systems (SDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SDS.2017.7939155","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Mitigating anti-forensics in the Cloud via resource-based privacy preserving activity attribution
The multi-tenant Cloud environment creates a plethora of both technical and legal difficulties for digital forensics. Digital forensics typically relies on the analysis of evidence images or residual data. Due to the distributed nature of cloud environments can cause the required dataset to scale rapidly. When coupled with diversely heterogeneous environments, the widespread uptake of anti-forensic data and encryption, privacy requirements and a non-standardised architecture across Cloud Service Providers (CSPs), attribution of any activity for a forensic investigation becomes a tedious task. This paper presents an architecture agnostic, privacy-preserving solution to reducing the digital forensics target search space of a investigation within cloud and edge computing environments which will leverage standard metering and network logs for efficient activity attribution.