2019
DOI: 10.1109/jiot.2018.2838569
|View full text |Cite
|
Sign up to set email alerts
|

A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…Digital forensics can also be utilized for accountability of privacy violations. Zou et al [174] propose a privacy leakage forensics scheme with taint analysis and RAM mirroring to obtain digital evidences without touching user's privacy data in a simulated virtual environment. More research efforts are required in terms of resilience, collaboration, QoS enhancement, and privacy preservation in the implementation of digital forensics for metaverse applications.…”
Section: B Digital Governance In Metaversementioning
confidence: 99%
“…Digital forensics can also be utilized for accountability of privacy violations. Zou et al [174] propose a privacy leakage forensics scheme with taint analysis and RAM mirroring to obtain digital evidences without touching user's privacy data in a simulated virtual environment. More research efforts are required in terms of resilience, collaboration, QoS enhancement, and privacy preservation in the implementation of digital forensics for metaverse applications.…”
Section: B Digital Governance In Metaversementioning
confidence: 99%
“…Digital forensics can be utilized for accountability of privacy violations. Zou et al [138] propose a privacy leakage forensics scheme with taint analysis and RAM mirroring to obtain digital evidences without touching user's privacy data in a simulated virtual environment. More research efforts are required in terms of resilience, collaboration, QoS enhancement, and privacy preservation in the implementation of digital forensics for metaverse applications.…”
Section: H Digital Governancementioning
confidence: 99%
“…Automatic video frame addition or deletion forensics with anti-forensics detection •Able to automatically detect video tampering/forgeries with high accuracy •Lack trusted whole-process video forensics Anti-forensic, game theory [138] Privacy violation ~ Privacy leakage forensics to ensure accountability of privacy violations •High detection efficiency of privacy leakage paths on real malware samples •Only consider limited detection attributes and privacy leakage paths…”
Section: B Energy-efficient and Collaborative Metaversementioning
confidence: 99%
“…The aim of cloud forensics is to process large sets of data from the cloud and recover evidence. A multigranularity privacy leakage forensics method put forward by the authors of [223] allows for analysis of privacy violations which have been caused by malware.…”
Section: Forensicsmentioning
confidence: 99%