Damaged backup data recovery method for Windows mobile
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Bang, Jewan | - |
dc.contributor.author | Lee, Changhoon | - |
dc.contributor.author | Lee, Sangjin | - |
dc.contributor.author | Lee, Kyungho | - |
dc.date.accessioned | 2021-09-05T19:43:40Z | - |
dc.date.available | 2021-09-05T19:43:40Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2013-11 | - |
dc.identifier.issn | 0920-8542 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/101758 | - |
dc.description.abstract | Recent developments in grid and cloud computing technologies have enhanced the performance and scale of storage media. Data management and backup are becoming increasingly important in these environments. Backup systems constitute an important component of operating system security. However, it is difficult to recover backup data from an environment where the operating system does not work because the storage hardware has been damaged. This study analyzes the Volume Shadow Copy Service (VSS) used by the Windows operating system. Windows 8 has been implemented for mobile environments; hence, it could be used for data recovery from damaged mobile devices. VSS is a backup infrastructure provided by Windows that creates point-in-time copies of a volume (known as volume shadow copies). Windows Vista and later versions use this service instead of the restore point feature used in earlier versions of the operating system. The restore point feature logically copied and stored specified files, whereas VSS copies and stores only data that have changed in the volume. In a live system, volume shadow copies can be checked and recovered using built-in system commands. However, it is difficult to analyze the files stored in the volume shadow copies of a nonfunctioning system, such as a disk image, because only the changed data are stored. Therefore, this study analyzes the structure of Volume Shadow Copy (VSC) files that were logically stored. This analysis confirms the locations of the changed data and original copies by identifying a structure that stores the file data stream to file system metadata. On the basis of our research, we propose a practical application to develop tools for the recovery of snapshot data stored within the VSC files. We also present results of our successful performance test. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.title | Damaged backup data recovery method for Windows mobile | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Sangjin | - |
dc.contributor.affiliatedAuthor | Lee, Kyungho | - |
dc.identifier.doi | 10.1007/s11227-013-0919-6 | - |
dc.identifier.scopusid | 2-s2.0-84887997261 | - |
dc.identifier.wosid | 000326461100017 | - |
dc.identifier.bibliographicCitation | JOURNAL OF SUPERCOMPUTING, v.66, no.2, pp.875 - 887 | - |
dc.relation.isPartOf | JOURNAL OF SUPERCOMPUTING | - |
dc.citation.title | JOURNAL OF SUPERCOMPUTING | - |
dc.citation.volume | 66 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 875 | - |
dc.citation.endPage | 887 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | Hybrid information security | - |
dc.subject.keywordAuthor | Data recovery | - |
dc.subject.keywordAuthor | Mobile device | - |
dc.subject.keywordAuthor | Windows 8 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.