Zettabyte File System Autopsy: Digital Crime Scene Investigation for Zettabyte File System
نویسنده
چکیده
Files stored on a computer are managed by the file system of the operating system. When a computer is used to store illegal data such as child pornography, it is important that the existence of the illegal data can be proven even after the data is deleted. In this study, a new functionality is added to the Zettabyte File System (ZFS) debugger, which digs into the physical disk of the computer without using the file system layer of the operating system. This new functionality enables digital crime scene investigators to retrieve any data from the disk, including deleted files. This paper briefly presents an explanation of ZFS internals and describes the approach taken to arrive at the new ZFS debugger functionality. By using this new functionality, we find that the content and all the metadata (file size, owner, creation time, etc) of a deleted file can be retrieved directly from the disk without going through the file system layer of the operating
منابع مشابه
An Improved Performance Evaluation on Large-Scale Data using MapReduce Technique
Abstract: In a day-to-day life, the capacity of data increased enormously with time. The growth of data which will be unmanageable in social networking sites like Facebook, Twitter. In the past two years the data flow can increase in zettabyte. To handle big data there are number of applications has been developed. However, analyzing big data is a very challenging task today. Big Data refers to...
متن کاملAccuracy of an Intraoral Digital System for File Length Measurement
Introdouction: Canal length measurement is essential for proper endodontic treatment. Any error or miscalculation in working length determination, particularly in curved canals, can result in complications during or after root canal therapy. Digital radiography has enabled accurate measurement of curved canal length. In this study, we evaluated the accuracy of calibration of a complementary m...
متن کاملAnalyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملInformation assurance in a distributed forensic cluster
When digital forensics started in the mid-1980s most of the software used for analysis came from writing and debugging software. Amongst these tools was the UNIX utility ‘dd’ which was used to create an image of an entire storage device. In the next decade the practice of creating and using ‘an image’ became established as a fundamental base of what we call ‘sound forensic practice’. By virtue ...
متن کاملبررسی عملکرد کالیبراسیون نرمافزار سیستم دیجیتال CMOS در ارزیابی طول کارکرد کانال
Background and Aims: Estimating the canal length is essential for reaching to a proper endodontic treatment. Any error and miscalculation in estimation of the working length, especially in curved canals, can result in complication during and after root canal therapy. The introduction of digital radiography has enabled us to measure curved canal length. The purpose of this study was to evaluat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009