2017
DOI: 10.1109/tcc.2016.2535295
|View full text |Cite
|
Sign up to set email alerts
|

ForenVisor: A Tool for Acquiring and Preserving Reliable Data in Cloud Live Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(9 citation statements)
references
References 33 publications
0
9
0
Order By: Relevance
“…Data sharing and data access are also examined by Pasquier et al (2016) and Yan et al (2016) in this special issue. Specifically, Pasquier et al (2016) present the Cambridge Flow Control Architecture (CamFlow) designed to enforce data flow policy and reduce the potential for data leakage due to malicious or buggy software, and Yan et al (2016) present a data access scheme which employs both attribute-based encryption and proxy re-encryption.…”
Section: Privacy (Includes Data Access and Data Sharing)mentioning
confidence: 97%
See 2 more Smart Citations
“…Data sharing and data access are also examined by Pasquier et al (2016) and Yan et al (2016) in this special issue. Specifically, Pasquier et al (2016) present the Cambridge Flow Control Architecture (CamFlow) designed to enforce data flow policy and reduce the potential for data leakage due to malicious or buggy software, and Yan et al (2016) present a data access scheme which employs both attribute-based encryption and proxy re-encryption.…”
Section: Privacy (Includes Data Access and Data Sharing)mentioning
confidence: 97%
“…Consequently, there is a growing need for forensic investigations to ascertain how an attack was carried out or how an event occurred on a cloud service. This is the gap that and Qi et al (2016) seek to address. introduce a fully reversible privacy region protection for cloud video surveillance based on their proposed fully reversible privacy protection method for H.264/AVC compressed video.…”
Section: Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is also compatible only with the FAT32 file system. It uses a Windows platform for its prototype [23].…”
Section: Forenvisormentioning
confidence: 99%
“…I VMMs can "run directly on the hardware without the" (Qi et al, 2017) need of hosting OS (e.g., ESXi (VMWare, 2009)), and (ii) type II VMMs run on the hosting OS (e.g., KVM (Kivity et al, 2009) or Xen (Barham et al, 2003)). VMs are located within hosts, and the number of available VMs depends on the resource constraints of the host.…”
Section: Accepted Manuscriptmentioning
confidence: 99%