File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1631/jzus.C1000425
- Scopus: eid_2-s2.0-80755159526
- WOS: WOS:000296253000003
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: K-Dimensional hashing scheme for hard disk integrity verification in computer forensics
Title | K-Dimensional hashing scheme for hard disk integrity verification in computer forensics | ||||||||
---|---|---|---|---|---|---|---|---|---|
Authors | |||||||||
Keywords | Computer Forensics Digital Evidence Hard Disk Integrity K-Dimensional Hashing | ||||||||
Issue Date | 2011 | ||||||||
Publisher | Zheijiang University Press and Springer-Verlag. The Journal's web site is located at http://www.springer.com/engineering/electronics/journal/11714 | ||||||||
Citation | Journal Of Zhejiang University: Science C, 2011, v. 12 n. 10, p. 809-818 How to Cite? | ||||||||
Abstract | Verifying the integrity of a hard disk is an important concern in computer forensics, as the law enforcement party needs to confirm that the data inside the hard disk have not been modified during the investigation. A typical approach is to compute a single chained hash value of all sectors in a specific order. However, this technique loses the integrity of all other sectors even if only one of the sectors becomes a bad sector occasionally or is modified intentionally. In this paper we propose a k-dimensional hashing scheme, kD for short, to distribute sectors into a kD space, and to calculate multiple hash values for sectors in k dimensions as integrity evidence. Since the integrity of the sectors can be verified depending on any hash value calculated using the sectors, the probability to verify the integrity of unchanged sectors can be high even with bad/modified sectors in the hard disk. We show how to efficiently implement this kD hashing scheme such that the storage of hash values can be reduced while increasing the chance of an unaffected sector to be verified successfully. Experimental results of a 3D scheme show that both the time for computing the hash values and the storage for the hash values are reasonable. © 2011 Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg. | ||||||||
Persistent Identifier | http://hdl.handle.net/10722/152476 | ||||||||
ISSN | 2016 Impact Factor: 0.770 | ||||||||
ISI Accession Number ID |
Funding Information: Project supported by the Research Grants Council of Hong Kong SAR, China (No. RGC GRF HKU 713009E), the NSFC/RGC Joint Research Scheme (No. N_HKU 722/09), and HKU Seed Fundings for Basic Research (Nos. 200811159155 and 200911159149) | ||||||||
References | |||||||||
Grants |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jiang, ZL | en_US |
dc.contributor.author | Fang, JB | en_US |
dc.contributor.author | Hui, LCK | en_US |
dc.contributor.author | Yiu, S | en_US |
dc.contributor.author | Chow, KP | en_US |
dc.contributor.author | Sheng, MM | en_US |
dc.date.accessioned | 2012-06-26T06:39:30Z | - |
dc.date.available | 2012-06-26T06:39:30Z | - |
dc.date.issued | 2011 | en_US |
dc.identifier.citation | Journal Of Zhejiang University: Science C, 2011, v. 12 n. 10, p. 809-818 | en_US |
dc.identifier.issn | 1869-1951 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/152476 | - |
dc.description.abstract | Verifying the integrity of a hard disk is an important concern in computer forensics, as the law enforcement party needs to confirm that the data inside the hard disk have not been modified during the investigation. A typical approach is to compute a single chained hash value of all sectors in a specific order. However, this technique loses the integrity of all other sectors even if only one of the sectors becomes a bad sector occasionally or is modified intentionally. In this paper we propose a k-dimensional hashing scheme, kD for short, to distribute sectors into a kD space, and to calculate multiple hash values for sectors in k dimensions as integrity evidence. Since the integrity of the sectors can be verified depending on any hash value calculated using the sectors, the probability to verify the integrity of unchanged sectors can be high even with bad/modified sectors in the hard disk. We show how to efficiently implement this kD hashing scheme such that the storage of hash values can be reduced while increasing the chance of an unaffected sector to be verified successfully. Experimental results of a 3D scheme show that both the time for computing the hash values and the storage for the hash values are reasonable. © 2011 Journal of Zhejiang University Science Editorial Office and Springer-Verlag Berlin Heidelberg. | en_US |
dc.language | eng | en_US |
dc.publisher | Zheijiang University Press and Springer-Verlag. The Journal's web site is located at http://www.springer.com/engineering/electronics/journal/11714 | - |
dc.relation.ispartof | Journal of Zhejiang University: Science C | en_US |
dc.subject | Computer Forensics | en_US |
dc.subject | Digital Evidence | en_US |
dc.subject | Hard Disk Integrity | en_US |
dc.subject | K-Dimensional Hashing | en_US |
dc.title | K-Dimensional hashing scheme for hard disk integrity verification in computer forensics | en_US |
dc.type | Article | en_US |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_US |
dc.identifier.email | Yiu, S:smyiu@cs.hku.hk | en_US |
dc.identifier.email | Chow, KP:chow@cs.hku.hk | en_US |
dc.identifier.authority | Hui, LCK=rp00120 | en_US |
dc.identifier.authority | Yiu, S=rp00207 | en_US |
dc.identifier.authority | Chow, KP=rp00111 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1631/jzus.C1000425 | en_US |
dc.identifier.scopus | eid_2-s2.0-80755159526 | en_US |
dc.identifier.hkuros | 223901 | - |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-80755159526&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.volume | 12 | en_US |
dc.identifier.issue | 10 | en_US |
dc.identifier.spage | 809 | en_US |
dc.identifier.epage | 818 | en_US |
dc.identifier.isi | WOS:000296253000003 | - |
dc.relation.project | Cryptanalysis and Implementation of Cipher | - |
dc.identifier.scopusauthorid | Jiang, ZL=24344329800 | en_US |
dc.identifier.scopusauthorid | Fang, JB=36132767400 | en_US |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_US |
dc.identifier.scopusauthorid | Yiu, S=7003282240 | en_US |
dc.identifier.scopusauthorid | Chow, KP=7202180751 | en_US |
dc.identifier.scopusauthorid | Sheng, MM=54407420400 | en_US |
dc.identifier.issnl | 1869-1951 | - |