On Achieving Encrypted File Recovery

نویسندگان

  • Xiaodong Lin
  • Chenxi Zhang
  • Theodora Dule
چکیده

As digital devices become more prevalent in our society, evidence relating to crimes will be more frequently found on digital devices. Computer forensics is becoming a vital tool required by law enforcement for providing data recovery of key evidence. File carving is a powerful approach for recovering data especially when file system metadata information is unavailable. Many file carving approaches have been proposed, but cannot directly apply to encrypted file recovery. In this paper, we first identify the problem of encrypted file recovery, and then propose an effective method for encrypted file recovery through recognizing the encryption algorithm and mode in use. We classify encryption modes into two categories. For each category, we introduce a corresponding mechanism for file recovery, and also propose an algorithm to recognize the encryption algorithm and mode. Finally, we theoretically analyze the accuracy rate of recognizing an entire encrypted file in terms of file types.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure and Efficient Erasure Code-based Content Transmission in Cloud Using Cp-abe Approach

-In cloud the retention of retrieval data transmission which contain collection of storage servers to enable expanded storage services .Transmission of content in cloud causes data robustness and data confidentiality .For data robustness implementation of erasure code-based content with multiple key servers are concerned for the recovery process using redundancy. For data confidentiality implem...

متن کامل

File-injection Attack and Forward Security for Order-revealing Encryption

Order-preserving encryption (OPE) and order-revealing encryption (ORE) are among the core ingredients for encrypted database (EDB) systems as secure cloud storage. In this work, we study the leakage of OPE and ORE and their forward security. We propose generic yet powerful file-injection attacks (FIAs) on OPE/ORE, aimed at the situations of possessing order by and range queries. The FIA schemes...

متن کامل

On Consistency of Encrypted Files

In this paper we address the problem of consistency for cryptographic file systems. A cryptographic file system protects the users’ data from the file server, which is possibly untrusted and might exhibit Byzantine behavior, by encrypting the data before sending it to the server. The consistency of the encrypted file objects that implement a cryptographic file system relies on the consistency o...

متن کامل

EliMFS: Achieving Efficient, Leakage-resilient, and Multi-keyword Fuzzy Search on Encrypted Cloud Data

Motivated by privacy preservation requirements for outsourced data, keyword searches over encrypted cloud data have become a hot topic. Compared to single-keyword exact searches, multi-keyword fuzzy search schemes attract more attention because of their improvements in search accuracy, typo tolerance, and user experience in general. However, existing multi-keyword fuzzy search solutions are not...

متن کامل

Advanced Digital Steganography using Encrypted Secret Message and Encrypted Embedded Cover File

In the present work the authors are proposing a new steganography method to hide any encrypted secret message in multiple steps. In step-1 the secret message is encrypted using TTJSA algorithm. In step-2 we embed this encrypted message inside one known image or audio file using 4-th bit from LSB substitution method. In step-3 we again encrypt the embedded cover file using TTJSA algorithm . Fina...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010