Unlock instant, AI-driven research and patent intelligence for your innovation.

Credibility verification system and method for distributed cloud evidence collection

A verification method and reliability technology, applied in the field of computer networks, can solve the problems of inability to use high-speed and efficient data access, data privacy protection, insertion and deletion, etc., achieve efficient storage and deletion, avoid false positives, Effects of Prohibited Modifications

Pending Publication Date: 2020-12-01
NANJING UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the big data environment, traditional Bloom filters cannot use high-speed and efficient data access, and due to the inherent shortcomings of traditional Bloom filters, data privacy protection and correct insertion and deletion cannot be performed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credibility verification system and method for distributed cloud evidence collection
  • Credibility verification system and method for distributed cloud evidence collection
  • Credibility verification system and method for distributed cloud evidence collection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solutions provided by the present invention will be described in detail below in conjunction with specific examples. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention.

[0060] figure 1 Shown is an overview diagram of the architecture capable of implementing the solution of the present invention, including cloud nodes (CN), corresponding evidence-forensing agent modules (BFA) and credibility verification modules (ECV) for each node.

[0061] The distributed cloud forensics credibility verification system provided by the present invention includes: a cloud forensics agent module, a source data collection module and an evidence credibility verification module. The cloud forensics agent modules are bound to their respective cloud nodes, and each node corresponds to a forensics agent module; the source data collection module is bound...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed cloud evidence obtaining credibility verification system and method. The system comprises a cloud evidence obtaining agent module, a source data collection moduleand an evidence credibility verification module. The cloud evidence obtaining agent module comprises a traceability data generation module, a multilayer compressed Bloom filter module, a data persistence module and an evidence transmission module; the method is based on an improved multi-layer compressed Bloom filter, and can be used in an untrusted multi-tenant cloud environment. According to the method, the untrustworthiness of participants in the evidence obtaining process is considered, tamper-proof protection is carried out on the data in a distributed mode, and the privacy of a user isnot invaded; according to the mechanism, each cloud node is bound with a cloud evidence obtaining agent for evidence collection, calculation, analysis and transmission, and a central credibility verification module sends a credibility verification command regularly or manually for credibility verification; the method is based on event driving, does not modify any code of a target operating system,is low in performance loss and high in flexibility, and is suitable for real-time cloud evidence obtaining and credibility analysis.

Description

technical field [0001] The invention relates to the technical field of computer networks, to a mechanism in the field of computer data behavior monitoring in a cloud environment, and in particular to a system and method for verifying the credibility of cloud evidence collection in a cloud environment. Background technique [0002] While cloud computing brings convenience, security issues have become the key to restricting its development. The characteristics of cloud computing, such as virtualization mechanism, multi-tenant, data off-site storage, and anonymous mechanism, make it easier to become a place for cybercrime. To ensure the healthy development of the cloud service market, the above security issues must be properly addressed. The best way to combat illegal behavior is undoubtedly to obtain relevant criminal evidence, submit it to the court, and use legal means to ensure the security of the cloud service market. Therefore, how to collect and analyze digital evidenc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64H04L9/06H04L29/06
CPCG06F21/64H04L9/0643H04L63/1425H04L63/1441H04L63/0227Y02D10/00
Inventor 伏晓叶飞郑韵芝骆斌
Owner NANJING UNIV