CSEIT1726289.pdf: Paper Name
CSEIT1726289.pdf: Paper Name
PAPER NAME
CSEIT1726289.pdf
5 Pages 707.7KB
May 26, 2022 11:10 AM GMT+5:30 May 26, 2022 11:11 AM GMT+5:30
Summary
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
© 2017 IJSRCSEIT | Volume 2 | Issue 6 | ISSN : 2456-3307
ABSTRACT
There is a need of digital forensics approach to solve the cases of crime investigation based on the computer and
1
mobile phones, which involves advanced to sophisticated digital misuse of systems. Digital forensics is always a
advanced field as a career in forensics with the rise of laws that can take control on legal cases and computer
1
technology that is becoming ubiquitous. This paper tells the studies of important techniques used over traditional
Hard Drive Disk and upgraded technique needed over Solid State Drives to perform digital forensics investigation.
Solid States Drives introduces a new challenge into the field of digital forensics specialists. The use of SSD is
enough easy accessible and for many purposes it is used as a normal hard disk but many times faster and with the
HDD’s and needs very low power utilization. But, Solid state drive is not a change of hard disk technology; it is a
technology that imitates the behavior of a hard disk. Obtaining effective information from Solid State Drives (SSD)
is a challenging forensic assignment. SSD’s may be deleting the evidences usually and even after sanitization of
SSDs, information may be recovered.
1
Keywords: Computer Forensics, Digital Forensics, Flash memory, Solid State Drive
1
I. INTRODUCTION collection self-corrosion in SDD's which also
1
permanently eliminates the deleted data in the
background from that sector within few minutes or
Solid State Drives SSD are dependent on non-volatile
immediately of the data being removed. Based on the
memory flash memory have overtaken the conventional
spindle platter hard disks to become a major storage data gathered it declares that decompose the of proof
1
issue in non-volatile memory and refined use TRIM
device used in computers and laptops present in the
command causes the hardening of a forensics
market. Nowadays tablet smartphone and notebook
investigation. The efficiency of TRIM mechanisms
devices wouldn't stay without the flash memory for the
could have a main distinction once enable for file
hard disk drives.Solid state drives don't have any
1
movable parts such as magnetic disks are movable read system whereas collecting the deleted data that
sometimes gets stores even when deletion. “The
and write heads which used to be existing in 1
technology of the SSD devices leads to vital impacts on
conventional hard drives like HDD's or floppy drives.
the capability of forensic investigators and analysts to
1
In the conventional magnetic hard disk covered in a search out and perceive the information hold on SSD
devices” [1].This may additionally justify to an explicit
magnetic material contains data in the patterns of 0' and
extend however coming flash memory used in SSD are
1' so having the inability to write in the same texts at
1 difficult for forensic analyses.
every location anytime. [1] [2] When data is been
deleted it would marked as erased but will be available
on an unused sector where these deleted files will be II. COMPONENTS OF SSD'S
1
recoverable at any time. The TRIM performs a deletion 1
of invalid data from the memory of SSD's pages to 1. Flash memory:
assure that the rewrite operation can be well performed The flash memory that deletes data at block level are
regularly. That feature is commonly called as garbage referred to as non-volatile storage. Data stored in a
7. Garbage collection:
The non-volatile memory which is using NAND
1
control, SSD’s uses the garbage collection for deleting
and rewriting of data into blocks. It is found that
1
Garbage collectionswill delete all the data instantly that
is deleted by users and marked as invalid by the
operating systems [7] [4]. The garbage collection isn't
Figure 1. SSD Controller [8] considered as the replacement for the TRIM
1
functionality with SSD’s, but TRIM would facilitate
4. Wear leveling: the garbage collection be additional efficient and
It refers to a memory management ways developed to improve performance [8]. The garbage collection and
increase the life of flash memory [7]. The supplier the wear leveling are the main reason for the data to be
frequently provides additional storage when designing written on the same blocks in SSD’s.
hard drives that are inaccessible by traditional ways
could improve the wear leveling a lot better. Usually in 8. Encryption:
SSD’s, data are keep in blocks which may be wipe Encryption of drives could be a may be a of applying
away and rewritten number of times. The wear leveling secret key or password to acquire data security to
would handle and ensure that the deletion and rewritten improve computer hard disks security from intrusion. It
cycles (based upon TRIM command uses) area unit in safeguards the disk drive by the implementation of
an evenly distributed order to perform efficiently and protection to every sector that also challenges the
also extend the lifespan of a hard drive. There'stwo forensic investigation. SSD’s performs marking the
Volume 2, Issue 6, November-December-2017| www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1082
1
data which is erased data as invalid but not necessary strong evidence to the court through forensic
erase from the page in the flash storage. So, if data is investigation. The current SSD have a garbage
not well encrypted at all time during the complete collection which would hold the data that are marked as
process of managing and deleting of data then it may deleted, but can be permanently deleted by overwriting
be recovered in the conventional hard drives [1] [9] [8]. mechanism to have that sector as new at the time [4]
1
Skilled peoplesuses encryption methods and third party [6]. These would make the forensic investigator tough
tools like TrueCrypt, PGP, BitLocker and another for recovering evidence from an SDD causing the
normal tool to achieve the highest level of data security evidence to be tampered during a court case [1].
in SSD’s. These are new factors which would bring
more complications and challengesduring forensics Overall, the research approves how flash technology in
examination of data analysis of SSD’s. SSDs differs from the traditional HDDs and makes it
complicated for recovering evidence during a forensic
1
Thus, data collected will show however non-volatile investigation [9]. Researches accepts how immoral
1
storage, controller, TRIM flash memory, self-corrosion, people with advance expertise level can completely
wear leveling garbage collection, encryption and other wipe off the HDD so that the deleted content couldn’t
new features by which,SSD operates creates a tough be recover under any circumstances later [3] [4]. It is
challenges for forensic examiner throughout an identified that manufacturers of SSD’s eliminate away
investigation. their implementation methods of the hard drives
making it difficult for forensics examiners to extract
III. RELATED WORK recoverable data from it [4] [6].
1
Solid state hard drives concerning with the forensics IV. ANALYSIS
investigation for recovering the deleted files in the past.
1
The steps taking place during the collection of evidence This review paper will provide detail analysis and
require acquisition, authentication, and analysis of study of results as listed below:
1
hard drives also needs an update with the rising use of i. Primarily, explanation the use and live
hybrid drive such as SSD’s in the new coming laptops response of enabling/disabling of TRIM
1
and computers. There have been numerous functionality, garbage collection, self-
investigations involving digital examinations of hard corrosion.
disks for evidence of crime to prove in the court to ii. To identify a kind of hard drive that is newly
1
punish the culprit. Most of researches have shown hybrid, traditional HDD or SSD to improve the
toward getting the most advancement of the forensics performance of analysis.
1
analysis of the regular hard drives. Research studies iii. Recommendations to overcome the challenges
have led the forensic investigation to require carving with TRIM on modern SSD’s forensics.
techniques or mechanisms to acquire essential content iv. Difference between traditional HDD
of the SSD drives which could help simplify task overSSD’sabout forensics investigation.
during forensics examinations [7]. While research v. To provide challenges for SSD forensics which
studies have shown that TRIM would require the is needed in the investigation w.r.t its multiple
1
supporting operating systems, specific disk format and storage, firmware, embedded controller and
cable connections, storage controller configuration to other factors.
be configured in IDE or ACHI mode and also 1
supporting firmware to perform it tasks [10] [12]. V. SOLID STATE DRIVE Vs. TRADITIONAL
HARD DISK DRIVE
1
It is find by the research that SSD supports data
retention with TRIM enabled file systems to ease any The traditional disk drive would work on a magnetic
1
digital investigation of hard drives. How enable TRIM disk platter where the platters are coated each side thus
causes the operating systems to delete file every time, as to store data in a magnetic form. So, all data are
which the sector remains empty at all time to re-write stored on both upper and lower surface of the platters
1
contains in those sectors. Modern SDD are capable of as tracks that is further divided into individual sectors.
self-corrosion which makes difficult for a providing When an operating machine is power on the disk comes
Volume 2, Issue 6, November-December-2017| www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1083
in use, and the OS needs to be able to scan the correct VI. FORENSICS FOR TRADITIONAL HARD
sector by spinning as fast as it can. DRIVES
Volume 2, Issue 6, November-December-2017| www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1084
1
Although, the IDE allows the forensic examiner to [2]. "SSD vs HDD: Difference. Advantages. What to
perform logical data read which is present on the of Choose for Hosting a Website?" Web Hosting
1
SSD for acquiring of data but also can hide internal Reviews Discount Coupons RSS.
1
data structures, which could make the investigation [3]. Gubanov, Yuri, and Oleg Afonin "Why SSD
difficult. As, some generators of SSD’s makes the SSD Drive Destroy Court Evidence and What can Be
1
in a form that it is almost impossible to retrieve the data Done About it." Belkasoft: Evidence Search and
reads to protect their implementation details it makes Analysis Software for Digital Forensic
tougher for forensics examiners [11]. With the rapid Investigations. Belkasoft, 1 Oct. 2012.
1
use of SSD with newer operating systems such as [4]. Wei, Michael, Laura Grupp, Steven Swanson.
1
Windows and linux, which are supporting enable, "Reliably Erasing Data from Flash-Based Solid
TRIM by default allows the deleted data to be fully State Drives." University of California, San
wiped making it a dead end to examiners. Diego.
1
[5]. "Partition Alignment of Intel SSDs for Achieving
1
The manufacturer additionally would need to Maximum Performance and Endurance." Intel,
implement a way to disable self-corrosion by default Intel, 1Feb. 2014.
1 1
therefore suspected criminals should be prosecuted for [6]. "Recovering Evidence from SSD Drive in 2014:
evidence being store and retrieved by the police. Also, Understanding TRIM, Garbage Collection and
the over provisioning provided by the manufacturer Exclusions." Forensic Focus Articles. Belkasoft,
should be in a very efficient manner so forensic 23 Sept. 2014.
1
examiners able to retrieve the implementation and [7]. Martin, Nick, and Jeff Zimmerman. "Analysis of
storage access when needed throughout a criminal the forensic challenges posed by flash devices."
investigation. University of Nebraska.
1
[8]. Rent, Thomas M. "SSD Controller." SSD
VIII. CONCLUSION Controller. Storage Review.
1
[9]. Nisbet, Alastair, Scott Lawrence, and Matthew
The improvement of the hard drive from old-fashioned Ruff "A Forensic Analysis And Comparison of
to most recent SSD have increased drastically that the Solid State Drive Data Retention With Trim
method is applied to preserve, identify and to extract Enabled File Systems" Site. Edith Cowan
the recoverable deleted data from modern hard University.
1
drivesare almost impossible or none to today’s date. As [10]. "SSD vs HDD – Why Solid State Drive." SSD vs
we have seen that TRIM functionality usage over disk HDD. A Toshiba Group Company.
1 1
formats isto identify the challenges toward forensic [11]. "Anatomy of Linux Flash File Systems."
investigation of modern SSD’s. Anatomy of Linux Flash File Systems. IBM
DeveloperWorks.
1
From the analysis it is shown how to use [12]. "SSD vs HDD: Difference. Advantages. What to
enabling/disabling TRIM command for reduce and Choose for Hosting a Website?" Web Hosting
improve the read and write achievements in SSD’s with Reviews Discount Coupons RSS.
1
the use of different operating Systems. [13]. Mao, Chau-yuan "SDD TRIM Operations:
Evaluation and Analysis" Site. Natinal Chiao
It is also seen that new SSD’s which are coming in the Tung University, July 2013.
1
market would be all right without TRIM functions
enable as long as the controller performs a fully delete
and rewrite operations to the pages working as similar
to garbage collections.
IX. REFERENCES
1
[1]. Fulton, John William "Solid State Disk
Forensics: Is there a Path Forward?" Utica
College, May 2014.
Volume 2, Issue 6, November-December-2017| www.ijsrcseit.com | UGC Approved Journal [ Journal No : 64718 ] 1085
Similarity Report ID: oid:30110:17652743
TOP SOURCES
The sources with the highest number of matches within the submission. Overlapping sources will not be
displayed.
d.researchbib.com
1 62%
Internet
Sources overview
Similarity Report ID: oid:30110:17652743
EXCLUDED SOURCES
ijsrcseit.com
98%
Internet
1library.net
89%
Internet
mafiadoc.com
64%
Internet
ijps.in
30%
Internet
researchgate.net
16%
Internet
ijeat.org
4%
Internet
ijsrcseit.com
3%
Internet
kinetik.umm.ac.id
2%
Internet
cersi.it
2%
Internet
humanities-digital-library.org
1%
Internet
Rutvi Shah, Priyanka Sharma. "Chapter 84 Bone Segmentation from X-Ray Im...
<1%
Crossref
technodocbox.com
<1%
Internet
coursehero.com
<1%
Internet
ijsrst.com
<1%
Internet
Sahera A. S. Almola. "Find Edge Map for Medical Images Based on Texture Ch...
<1%
Crossref
autodocbox.com
<1%
Internet
rebe.rau.ro
<1%
Internet
ijarcs.info
<1%
Internet
Tanweer Alam. "Blockchain and its Role in the Internet of Things (IoT)", Institu...
<1%
Crossref posted content
Ravi K Sheth, V. V. Nath. "Secured digital image watermarking with discrete c...
<1%
Crossref
Tanweer Alam. "Blockchain-based Big Data Analytics Approach for Smart Citi...
<1%
Crossref posted content
Rupal Sharma, Ravi Sheth. "Secure ASP.NET Web Application by Discovering ...
<1%
Crossref
Baha Rababah, Tanweer Alam, Rasit Eskicioglu. "The Next Generation Internet...
<1%
Crossref posted content
tutorialslink.com
<1%
Internet
searchstorage.techtarget.com
<1%
Internet
rajhacksoft.blogspot.com
<1%
Internet
blog.udemy.com
<1%
Internet
jurnalnasional.ump.ac.id
<1%
Internet
"Smart Systems and IoT: Innovations in Computing", Springer Science and Bu...
<1%
Crossref
zenodo.org
<1%
Internet
flexiblesolutions.com.au
<1%
Internet