Skip to main content
Log in

Digital forensic science approach by file recovery research

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Although many studies have been conducted on digital forensics, their viewpoints keep changing, and new studies are continuously required on fields that have not been researched yet. This paper proposes a privacy protection measure by applying permanent deletion to the Internet-of-Things platform: a digital forensic technique regarding privacy protection that has been regarded as a cautious subject. In addition, we propose a file recovery method by analyzing a file allocation area in a UNIX file system, which has not been addressed, and identifying the clue for journal area using a magic number.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  1. Morrissey S, Campbell T (2010) iOS forensic analysis for iPhone, iPad, and iPod touch, vol 23. Apress, Berkeley

    Book  Google Scholar 

  2. Horsman G, Conniss LR (2015) Investigating evidence of mobile phone usage by drivers in road traffic accidents. Digit Investig 12:S30–S37

    Article  Google Scholar 

  3. Hoog A (2011) Android forensics: investigation, analysis and mobile security for Google Android. Elsevier, Oxford

    Google Scholar 

  4. Roussev V (2016) Forensic analysis of cloud-native artifacts. Digit Investig:S104–S113

  5. JungTaek S, Seokjun L, Taeshik S (2015) A study on memory dump analysis based on digital forensic tools. Peer Peer Netw Appl 8(4):694–703

    Article  Google Scholar 

  6. Lee Y, Kim J-s (2014) A Framework for personal information protection in internet of things study on contents technology. The Korea Contents Society, pp 277–278

  7. Babar S et al (2011) Proposed embedded security framework for internet of things (iot). Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on. IEEE, 2011

  8. Seokjun L, Taeshik S (2014) Physical memory collection and analysis in SmartGrid embedded platform. MONET, ACM/Springer 19(3):382–391

  9. Albano P et al (2011) A novel anti-forensics technique for the android OS. Broadband and Wireless Computing, Communication and Applications (BWCCA), 2011 International Conference on. IEEE, 2011

  10. Lee S, Taeshik S (2014) Improved deleted file recovery technique for Ext2/3 Filesystem. JoS 70(1):20–30

    Google Scholar 

  11. Fairbanks KD (2012) An analysis of Ext4 for digital forensics. Digit Investig 9:S118–S130

    Article  Google Scholar 

  12. W3techs (2016) Usage of operating systems for websites, http://w3techs.com/technologies/overview/operating_system/all. Accessed 7 Feb 2016

  13. Garfinkel SL (2010) Digital forensics research: the next 10 years. Digit Investig 7:S64–S73

    Article  Google Scholar 

  14. Yongmin P, Hyunsoo C, Shon T (2015) Digital data investigation based on XFS filesystem metadata. Online Published, Multimedia Tools and Applications

  15. Narváez G (2007) Taking advantage of Ext3 journaling file system in a forensic investigation. SANS Institute, pp 1–35

  16. Piper S, Davis M, Manes G, Shenoi S (2005) Detecting hidden data in Ext2/Ext3 file systems. Adv Digit Forensics Int Fed Inf Process 194:245–256

    Article  Google Scholar 

  17. Dohyun KIM et al (2012) Forensic analysis of Android phone using Ext4 file system journal log. Future Information Technology, Application, and Service. Springer, The Netherlands

    Google Scholar 

  18. Avantika MATHUR et al (2007) The new ext4 filesystem: current status and future plans. In: Proceedings of the Linux symposium, pp 21–33

  19. Ext4 disk layout: data structure of Linux 4.5 and e2fsprogs-1.42.13. https://ext4.wiki.kernel.org/index.php/Ext4_Disk_Layout

  20. Langford GC (2003) System and method for securely deleting plaintext data. US Patent No. 6,507,911

  21. Fairbanks KD (2012) An analysis of Ext4 for digital forensics. Digi Investig 9:S118–S130

    Article  Google Scholar 

  22. Phillips D (2001) A directory index for EXT2. Annual Linux Showcase and Conference

  23. Carrier B (2005) File system forensic analysis. Addison-Wesley Professional, Reading

    Google Scholar 

Download references

Acknowledgements

This research was supported by the Public Welfare and Safety Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and Future Planning (NRF-2012M3A2A1051116). Following are results of a study on the “Leaders INdustry- university Cooperation” Project, supported by the Ministry of Education, Science and Technology.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to WooYeon Jo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jo, W., Chang, H. & Shon, T. Digital forensic science approach by file recovery research. J Supercomput 74, 3704–3725 (2018). https://doi.org/10.1007/s11227-016-1909-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-016-1909-2

Keywords

Navigation