• Cloud database encryption technology based on combinatorial encryption 

      Chen, Meng; Fu, Xiao; Luo, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...
    • Cloud Storage Forensics: BaiduNetDisk, WeiYun, and 115yun on a Wireless Network 

      Chen, Yuzhe; Fu, Xiao; Luo, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)
      With the development of cloud computing and wireless networks, cloud storage services are widely used in daily life. People can get access to cloud storage anytime and anywhere. Cloud storage forensics is a computer forensic ...
    • A design of firewall based on feedback of intrusion detection system in cloud environment 

      Ma, Xiaoyu; Fu, Xiao; Luo, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)
      Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
    • Haddle: A framework for investigating data leakage attacks in hadoop 

      Gao, Yun; Fu, Xiao; Luo, Bin; Du, Xiaojiang; Guizani, Mohsen ( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)
      Nowadays Hadoop is popular among businesses and individuals for its low costs, convenience, and fast speed. However, this also makes it the goal of data leakage attacks as sensitive data stored with an HDFS infrastructure ...
    • TamForen: A tamper-proof cloud forensic framework 

      Ye, Fei; Zheng, Yunzhi; Fu, Xiao; Luo, Bin; Du, Xiaojiang; ... more authors ( John Wiley and Sons Inc , 2022 , Article)
      Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive ...
    • Understanding Digital Forensic Characteristics of Smart Speaker Ecosystems 

      Liu, Xuanyu; Li, Ang; Fu, Xiao; Luo, Bin; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      With a built-in intelligent personal voice assistant providing QA services, smart speaker ecosystems combine multiple compatible components, including the internet of things (IoT) technology, mobile devices, and cloud ...
    • Visible Forensic Investigation for Android Applications by Using Attack Scenario Reconstruction 

      Song, Shiwen; Liu, Xuanyu; Fu, Xiao; Luo, Bin; Du, Xiaojiang; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      With the widespread use of Android devices, research on their security has attracted increasing attention. However, at present, digital forensics for investigating attacks, such as social engineering attacks and phishing ...