Abstract
Although many studies have been conducted on digital forensics, their viewpoints keep changing, and new studies are continuously required on fields that have not been researched yet. This paper proposes a privacy protection measure by applying permanent deletion to the Internet-of-Things platform: a digital forensic technique regarding privacy protection that has been regarded as a cautious subject. In addition, we propose a file recovery method by analyzing a file allocation area in a UNIX file system, which has not been addressed, and identifying the clue for journal area using a magic number.
Similar content being viewed by others
References
Morrissey S, Campbell T (2010) iOS forensic analysis for iPhone, iPad, and iPod touch, vol 23. Apress, Berkeley
Horsman G, Conniss LR (2015) Investigating evidence of mobile phone usage by drivers in road traffic accidents. Digit Investig 12:S30–S37
Hoog A (2011) Android forensics: investigation, analysis and mobile security for Google Android. Elsevier, Oxford
Roussev V (2016) Forensic analysis of cloud-native artifacts. Digit Investig:S104–S113
JungTaek S, Seokjun L, Taeshik S (2015) A study on memory dump analysis based on digital forensic tools. Peer Peer Netw Appl 8(4):694–703
Lee Y, Kim J-s (2014) A Framework for personal information protection in internet of things study on contents technology. The Korea Contents Society, pp 277–278
Babar S et al (2011) Proposed embedded security framework for internet of things (iot). Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on. IEEE, 2011
Seokjun L, Taeshik S (2014) Physical memory collection and analysis in SmartGrid embedded platform. MONET, ACM/Springer 19(3):382–391
Albano P et al (2011) A novel anti-forensics technique for the android OS. Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on. IEEE, 2011
Lee S, Taeshik S (2014) Improved deleted file recovery technique for Ext2/3 Filesystem. JoS 70(1):20–30
Fairbanks KD (2012) An analysis of Ext4 for digital forensics. Digit Investig 9:S118–S130
W3techs (2016) Usage of operating systems for websites, http://w3techs.com/technologies/overview/operating_system/all. Accessed 7 Feb 2016
Garfinkel SL (2010) Digital forensics research: the next 10 years. Digit Investig 7:S64–S73
Yongmin P, Hyunsoo C, Shon T (2015) Digital data investigation based on XFS filesystem metadata. Online Published, Multimedia Tools and Applications
Narváez G (2007) Taking advantage of Ext3 journaling file system in a forensic investigation. SANS Institute, pp 1–35
Piper S, Davis M, Manes G, Shenoi S (2005) Detecting hidden data in Ext2/Ext3 file systems. Adv Digit Forensics Int Fed Inf Process 194:245–256
Dohyun KIM et al (2012) Forensic analysis of Android phone using Ext4 file system journal log. Future Information Technology, Application, and Service. Springer, The Netherlands
Avantika MATHUR et al (2007) The new ext4 filesystem: current status and future plans. In: Proceedings of the Linux symposium, pp 21–33
Ext4 disk layout: data structure of Linux 4.5 and e2fsprogs-1.42.13. https://ext4.wiki.kernel.org/index.php/Ext4_Disk_Layout
Langford GC (2003) System and method for securely deleting plaintext data. US Patent No. 6,507,911
Fairbanks KD (2012) An analysis of Ext4 for digital forensics. Digi Investig 9:S118–S130
Phillips D (2001) A directory index for EXT2. Annual Linux Showcase and Conference
Carrier B (2005) File system forensic analysis. Addison-Wesley Professional, Reading
Acknowledgements
This research was supported by the Public Welfare and Safety Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2012M3A2A1051116). Following are results of a study on the “Leaders INdustry- university Cooperation” Project, supported by the Ministry of Education, Science and Technology.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jo, W., Chang, H. & Shon, T. Digital forensic science approach by file recovery research. J Supercomput 74, 3704–3725 (2018). https://doi.org/10.1007/s11227-016-1909-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-016-1909-2