Font Size: a A A

Research And Implementation Of Cloud Forensics System Based On Block Chain Technology

Posted on:2018-07-03Degree:MasterType:Thesis
Country:ChinaCandidate:L XuFull Text:PDF
GTID:2348330515486433Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Nowadays people are moving from IT era to DT(Data technology)era,while accompanied with the development and widespread apply of cloud computing,illegal acts against the cloud platform are also increasing.Electronic forensics technology is the key technology to combat computer crime and computer network crime,however,traditional electronic forensics technology and methods are facing many new challenges in the cloud computing environment.Compared to traditional electronic forensics,cloud forensics is confronted with many difficulties such as data decentralization,limited data control,hard to implement the forensics-supervision chain,multitenant environment,etc.So far,the academia has put forward a lot of technical proposals about cloud forensics,but the challenge of cloud computing for forensics work still not completely solved,especially in CSPs(cloud service provider),investigators,users a nd other dishonest scenes,as well as the forensics-supervision chain incomplete.In order to overcome the above problems,this paper proposes a cloud forensics scheme based on blockchain,adopting the brand-new concept of blockchain and using decentralized and trustless methods to guarantee both the proof party and preservation party cannot tamper the electronic evidence on the blockchain and to realize the verifiability and traceability of electronic evidence.Atop the brand-new idea of blockchain,recording the electronic data on the blockchain in combination of encryption algorithm,timestamp,digital signature and other technologies,the Cloud Forensics System based on Blockchain is designed and constructed in this project.The system mainly utilizes the distributed database of blockchain,that is,adopts P2 P network to achieve the decentralization,uses encryption algorithm to ensure the security of user data,employs Merkle Tree to guarantee the verifiability and traceability of data,makes use of consensus algorithm to ensure the data consistency among computing nodes,utilizes timestamp to guarantee the existence of data during or before specified time period and adopts the end-to-end linked data structure,etc.to actualize a decentralized,verifiable and tamperresistant cloud forensics system.
Keywords/Search Tags:Computer Forensics, Cloud Forensics, Block Chain, Peer 2 Peer, Forensics Model
PDF Full Text Request
Related items