An Efficient Scheme for Hard Disk Integrity Check in Digital Forensics by Hashing with Combinatorial Group Testing

نویسندگان

  • Junbin Fang
  • Zoe L. Jiang
  • C. K. Hui
چکیده

In this paper, we describe the problem of checking the integrity of a hard disk for forensics investigation after the computer of a suspect has been seized. Existing solutions do not provide a satisfactory solution to solve the problem. They either require a huge amount of storage to store the hash values of the sectors or may not be able to cope with the situation in an effective way in case some sectors have been changed (e.g. become bad sectors or deleted due to being part of the Legal Professional Privilege items). We propose an efficient hashing scheme with combinatorial group testing to calculate hash values for all sectors in a hard disk as the integrity proof and precisely locate the sectors which have been changed. Experimental results show that the scheme can significantly decrease the storage overhead (0.5MB needed for a 250GB hard disk) while require similar computational time compared to the existing approach. The computational time can be further decreased using our improved 2-stage approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient SSD Integrity Verification Program Based on Combinatorial Group Theory

In digital forensics, the issue of data integrity protection for increasingly widespread applied SSD (Solid State Disk, SSD) is to be resolved. Based on Combinatorial Group Theory, mapping data objects in SSD validation process and test object in combination group testing methods, using the non-adaptive mode to the initial calculation, stored procedures, and re-calculate, verify process, and ca...

متن کامل

Improving Disk Sector Integrity Using K-Dimension Hashing

The integrity of data stored on a hard disk is typically verified by computing the chained hash value of disk sector data in a specific order. However, this technique fails when one or more sectors turn bad during storage, making it impossible to compute their hash values. This paper presents a k-dimension hashing scheme, which computes and stores multiple hash values for each hard disk sector....

متن کامل

Computer Forensics: Investigations of the Future

I Passwords and Their Hashes . . . . . . . . 5 Abstract—Computer Forensics is a new field that uses traditional investigation processes and applies them to investigating a computer for digital evidence. In this paper, we will discuss the background of computer forensics and process of a digital investigation of a computer. Technical topics such cryptographic hashing and data hiding will be cove...

متن کامل

Throwing out the Enterprise with the Hard Disk

Organisations and individuals are increasingly store information and data about themselves on a wide variety of digital devices. These devices form an organisation’s ‘digital memory’ and as should be safeguarding against disclosure and breaches of integrity. Many organisations and individuals are employing various countermeasures often at considerable expense to protect this data. However, evid...

متن کامل

Reducing time cost in hashing operations

During a forensic investigation, an investigator might be required to analyze the content of a personal computer. Due to huge amounts of data, it becomes necessary to recognize suspect files and automatically filter out non-relevant files. To achieve this goal, an investigator can resort to hashing algorithms in order to classify files into known-to-be-good, known-to-be-bad and unknown files. T...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011