Font Size: a A A

Research Of Forensics Technology On Mobile Storage Equipment

Posted on:2015-05-12Degree:MasterType:Thesis
Country:ChinaCandidate:R J ZhangFull Text:PDF
GTID:2298330431964062Subject:Cryptography
Abstract/Summary:PDF Full Text Request
With the rapid development of computer networks and smart devices, computercrime and related sensitive information leaks often occur and become worse. Therefore,computer forensics came into being, it’s a new area involved in computer science,communications engineering, law and criminal investigation. Although in the infancy,it still attracts more and more experts and scholars to join in. In this paper, the mainworks are as follows.1The results of the current study in computer forensics and anti-forensics field aresummarized. Firstly, we show the current research in computer forensics technology,then introduce data recovery in detail which is the most basic technical knowledge inthis area. We also give particularly analysis of the composition and file structure of threemost common operating platforms-Windows, Linux, MacOS, and finally summarizethe recovery and forensic strategies under FAT, NTFS, ExtX, HFS+these file systems.2. A forensics model to mobile storage device based on a log is designed. Firstly,we generalize the operating principle and associated data recovery issues aboutremovable storage devices, taking U disk as an example. Secondly, we give an in-depthanalysis of the content features and internal structure of common log file type.Especially, we propose a dedicated forensic model for mobile storage devices to thecurrent problem existed, and finally introduce a new concept U disk log, and therelevant data structure definitions.3. A new log integrity checking method based on STD algorithm is designed.Firstly, introduction of the concept data integrity and relative research are given, thesame to the log integrity protection. Then, we adopt a new algorithm-STD algorithm,describe its background and application environment, and then give specific solution tointegrity check on massive logs issues by this algorithm. We can prove what we designmeets what we need.4At last, for needs under cloud storage, we propose encryption and retrievalsolution based on functional encryption to ciphertext database. Firstly we introduce theconcept of functional encryption and research progress of encrypted databases retrieval.Then we propose a valid database storage model and retrieval algorithm to characteristicelectronic evidence in database, with its security proof and efficiency analysis.
Keywords/Search Tags:Computer Forensics, Encrypted database, Log integrity, unction Encryption, Digital Signature
PDF Full Text Request
Related items