Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Damaged backup data recovery method for Windows mobile

Authors
Bang, JewanLee, ChanghoonLee, SangjinLee, Kyungho
Issue Date
11월-2013
Publisher
SPRINGER
Keywords
Hybrid information security; Data recovery; Mobile device; Windows 8
Citation
JOURNAL OF SUPERCOMPUTING, v.66, no.2, pp.875 - 887
Indexed
SCIE
SCOPUS
Journal Title
JOURNAL OF SUPERCOMPUTING
Volume
66
Number
2
Start Page
875
End Page
887
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/101758
DOI
10.1007/s11227-013-0919-6
ISSN
0920-8542
Abstract
Recent developments in grid and cloud computing technologies have enhanced the performance and scale of storage media. Data management and backup are becoming increasingly important in these environments. Backup systems constitute an important component of operating system security. However, it is difficult to recover backup data from an environment where the operating system does not work because the storage hardware has been damaged. This study analyzes the Volume Shadow Copy Service (VSS) used by the Windows operating system. Windows 8 has been implemented for mobile environments; hence, it could be used for data recovery from damaged mobile devices. VSS is a backup infrastructure provided by Windows that creates point-in-time copies of a volume (known as volume shadow copies). Windows Vista and later versions use this service instead of the restore point feature used in earlier versions of the operating system. The restore point feature logically copied and stored specified files, whereas VSS copies and stores only data that have changed in the volume. In a live system, volume shadow copies can be checked and recovered using built-in system commands. However, it is difficult to analyze the files stored in the volume shadow copies of a nonfunctioning system, such as a disk image, because only the changed data are stored. Therefore, this study analyzes the structure of Volume Shadow Copy (VSC) files that were logically stored. This analysis confirms the locations of the changed data and original copies by identifying a structure that stores the file data stream to file system metadata. On the basis of our research, we propose a practical application to develop tools for the recovery of snapshot data stored within the VSC files. We also present results of our successful performance test.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Kyung Ho photo

Lee, Kyung Ho
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE