近年來雲端服務、大數據、物聯網等技術相繼崛起發展,使得人們生活越加便利。雲端服務不僅為行動用戶帶來遠端存取資料的契機,也造成犯罪者能將犯罪資訊儲存於雲端,以便遠端存取犯罪事證,並降低自身攜有犯罪資料的風險。面對這樣的犯罪趨勢,本研究將提出一套以鑑識調查為目的的雲端鑑識機制,透過這樣的機制可保留關鍵證據,同時要能抵禦惡意外在攻擊,避免從雲端服務所萃取出來的證據遭受質疑。另外我們將針對iOS裝置上的雲端服務進行鑑識研究,透過網路分析、檔案分析及動態分析等3種分析方法,澈底瞭解在iOS裝置上所能發現的數位證據。Recently, the technology development of cloud service, big data, and IoT has improved our life more and more convenience than before. Cloud service not only makes users to access data remotely, but also makes criminals to save the data of criminal in cloud, they can access the criminal evidence remotely, and reduce the risk of keeping the criminal data by themselves. This paper proposes a scheme of cloud forensics investigation, which could defend the cloud system from the outside offende...
The article is devoted to one of the most common crimes in the field of computer information - ident...
基于实时取证的思想,提出了一种安全可取证操作系统(security forensics operating system,简称SeFOS)的概念和实现思路.提出了其总体结构,建立了该系统的取证行为模型...
Identifying and acquiring data stored in a cloud environment is a complicated and challenging proces...
為了取得網路犯罪的證據,網路鑑識這門技術逐漸受到重視,現今主要的網路鑑識方法大多是事後人工的分析,此方法尤其在大量網路流量的雲端環境下十分耗時,因此,網路鑑識的自動化是個不可或缺的任務。本論文中,我們...
[[abstract]]這幾年雲端運算漸漸蓬勃發展,其主要有三種不同的雲,分別是公有雲、私有雲及混和雲。而雲端使用者在這些雲中進行身份驗證時,其必須能辨別目前的雲端伺服器是否為偽造的,並且雲端伺服器也...
Cloud computing is a relatively new development in computing which has a significant impact on the e...
[[abstract]]雲端運算環境中 因服務商提供越來越多的雲端服務 使用者可於日常生活中使用這些便利的服務。使用者除了少許的個人資料儲存在前端外 主要的資料是由雲端服務商所維護。一旦攻擊者試...
This PhD thesis discusses the impact of Cloud Computing infrastructures on Digital Forensics in the ...
Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infras...
Abstract—In recent years, cloud computing has become popular as a cost-effective and efficient compu...
The highly distribution of cloud storage as a mean to store data rises the need to find a suitable f...
Cloud computing technologies have significantly changed the way in which organizations implement the...
Current cloud architectures do not support digital forensic investigators, nor comply with today’s d...
Cloud computing technology is a rapidly growing field of study, which relies on sharing computing re...
Over the past decades, practitioners and researchers have made remarkable achievements in digital fo...
The article is devoted to one of the most common crimes in the field of computer information - ident...
基于实时取证的思想,提出了一种安全可取证操作系统(security forensics operating system,简称SeFOS)的概念和实现思路.提出了其总体结构,建立了该系统的取证行为模型...
Identifying and acquiring data stored in a cloud environment is a complicated and challenging proces...
為了取得網路犯罪的證據,網路鑑識這門技術逐漸受到重視,現今主要的網路鑑識方法大多是事後人工的分析,此方法尤其在大量網路流量的雲端環境下十分耗時,因此,網路鑑識的自動化是個不可或缺的任務。本論文中,我們...
[[abstract]]這幾年雲端運算漸漸蓬勃發展,其主要有三種不同的雲,分別是公有雲、私有雲及混和雲。而雲端使用者在這些雲中進行身份驗證時,其必須能辨別目前的雲端伺服器是否為偽造的,並且雲端伺服器也...
Cloud computing is a relatively new development in computing which has a significant impact on the e...
[[abstract]]雲端運算環境中 因服務商提供越來越多的雲端服務 使用者可於日常生活中使用這些便利的服務。使用者除了少許的個人資料儲存在前端外 主要的資料是由雲端服務商所維護。一旦攻擊者試...
This PhD thesis discusses the impact of Cloud Computing infrastructures on Digital Forensics in the ...
Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infras...
Abstract—In recent years, cloud computing has become popular as a cost-effective and efficient compu...
The highly distribution of cloud storage as a mean to store data rises the need to find a suitable f...
Cloud computing technologies have significantly changed the way in which organizations implement the...
Current cloud architectures do not support digital forensic investigators, nor comply with today’s d...
Cloud computing technology is a rapidly growing field of study, which relies on sharing computing re...
Over the past decades, practitioners and researchers have made remarkable achievements in digital fo...
The article is devoted to one of the most common crimes in the field of computer information - ident...
基于实时取证的思想,提出了一种安全可取证操作系统(security forensics operating system,简称SeFOS)的概念和实现思路.提出了其总体结构,建立了该系统的取证行为模型...
Identifying and acquiring data stored in a cloud environment is a complicated and challenging proces...