Stub file
View article
Development of Data Lake Core Open
This thesis detailed the development of a data lake core microservice in Java and Clojure, using IPFS as an append-only storage. It provides a HTTP interface for data ingestion, query and extraction, with a query abstract syntax tree denot…
View article
Blockchain-Based, Decentralized Access Control for IPFS Open
Large files cannot be efficiently stored on blockchains. On one hand side, the blockchain becomes bloated with data that has to be propagated within the blockchain network. On the other hand, since the blockchain is replicated on many node…
View article
A method for verifying integrity & authenticating digital media Open
Due to their massive popularity, image files, especially JPEG, offer high potential as carriers of other information. Much of the work to date on this has focused on stenographic ways of hiding information using least significant bit techn…
View article
ctFS: Replacing File Indexing with Hardware Memory Translation through Contiguous File Allocation for Persistent Memory Open
Persistent byte-addressable memory (PM) is poised to become prevalent in future computer systems. PMs are significantly faster than disk storage, and accesses to PMs are governed by the Memory Management Unit (MMU) just as accesses with vo…
View article
AFEIC: Advanced forensic Ext4 inode carving Open
In forensic computing, especially in the field of postmortem file system forensics, the reconstruction of lost or deleted files plays a major role. The techniques that can be applied to this end strongly depend on the specifics of the file…
View article
Network file-storage system Open
The Common File System (CFS) is a file management and mass storage system for the Los Alamos National Laboratory's computer network. The CFS is organized as a hierarchical storage system: active files are stored on fast-access storage devi…
View article
Ext4 and XFS File System Forensic Framework Based on TSK Open
Recently, the number of Internet of Things (IoT) devices, such as artificial intelligence (AI) speakers and smartwatches, using a Linux-based file system has increased. Moreover, these devices are connected to the Internet and generate vas…
View article
Reverse engineering of ReFS Open
File system forensics is an important part of Digital Forensics. Investigators of storage media have traditionally focused on the most commonly used file systems such as NTFS, FAT, ExFAT, Ext2-4, HFS+, APFS, etc. NTFS is the current file s…
View article
Forensic APFS File Recovery Open
In forensic computing, especially in the field of postmortem file system forensics, the reconstruction of lost or deleted files plays a major role. The techniques that can be applied to this end strongly depend on the specifics of the file…
View article
SubZero Open
POSIX-style read() and write() have long been the standard interface for accessing data in files. However, the data copy into and out of memory these methods require imposes an unnecessary overhead when files are stored in fast persistent …
View article
Geometries for Minnesota Database 2019 Open
Minnesota Database 2019 comprises of a diverse set of chemical data that can be used for benchmarking electronic structure calculations and/or optimizing density functionals or wave function methods. The reference values of the data have b…
View article
File Reconstruction in Digital Forensic Open
File recovery is one of the stages in computer forensic investigative process to identify an acquired file to be used as digital evident. The recovery is performed on files that have been deleted from a file system. However, in order to re…
View article
Disk Cluster Allocation Behavior in Windows and NTFS Open
The allocation algorithm of a file system has a huge impact on almost all aspects of digital forensics, because it determines where data is placed on storage media. Yet there is only basic information available on the allocation algorithm …
View article
Efficient Directory Mutations in a Full-Path-Indexed File System Open
Full-path indexing can improve I/O efficiency for workloads that operate on data organized using traditional, hierarchical directories, because data is placed on persistent storage in scan order. Prior results indicate, however, that renam…
View article
Extraction of Creation-Time for Recovered Files on Windows FAT32 File System Open
In this article, we propose a creation order reconstruction method of deleted files for the FAT32 file system with Windows operating systems. Creation order of files is established using a correlation between storage locations of the files…
View article
A New Way to Store Simple Text Files Open
In the era of ubiquitous digitization, the Internet of Things (IoT), information plays a vital role. All types of data are collected, and some of this data are stored as text files. An important aspect—regardless of the type of data—is rel…
View article
Content-based File Sharing in Peer-to-peer Networks Using Threshold Open
In content based file sharing peer-to-peer (P2P) [1] network model nodes share files directly with each other without a centralized server. In such a file sharing system, nodes meet and exchange requests and files in the format of text, sh…
View article
Two Novel Server-Side Attacks against Log File in Shared Web Hosting Servers Open
Shared Web Hosting service enables hosting multitude of websites on a single powerful server. It is a well-known solution as many people share the overall cost of server maintenance and also, website owners do not need to deal with adminis…
View article
The Composite-File File System Open
The design and implementation of traditional file systems typically use the one-to-one mapping of logical files to their physical metadata representations. File system optimizations generally follow this rigid mapping and miss opportunitie…
View article
Effective Renewal and Signing Method to Achieve Secure Storage and Computation Using Hybrid RSA-MABC Algorithm Open
Cloud providers offer several storage services for their users in efficient manner.Cloud users are allowed to store their data in cloud.The data leakage, lack of proper security control policy, and weakness in the data security are the mai…
View article
Design Of A Secure Virtual File Storage System On Cloud Using Hybrid Cryptography Open
As Security is becoming more and more useful in the field of computing, users would like to be sure of how secure their files are on a system, as security is one of the most crucial fields in networking and file storage. Dependable file st…
View article
Experiences on File Systems: Which is the best file system for you? Open
The distributed file system landscape is scattered. Besides a plethora of research file systems, there is also a large number of production grade file systems with various strengths and weaknesses. The file system, as an abstraction of per…
View article
Files as directories: some thoughts on accessing structured data within files Open
This paper explores the concept of files as directories (FAD) as a unified interface to structured data within a file by representing such a file as (virtual) directory and the structured data as subdirectories and subfiles. Transparent co…
View article
File Systems are Hard to Test — Learning from Xfstests Open
Modern file systems, such as ext4, btrfs, and XFS, are evolving and enable the introduction of new features to meet ever-changing demands and improve reliability. File system developers are struggling to eliminate all software bugs, but th…
View article
Analysis of Optimal File Placement for Energy-Efficient File-Sharing Cloud Storage System Open
Popular data concentration is a widely accepted storage energy-saving technique which places frequently-accessed data on a small subset of hard disks and spins-down other infrequently-accessed disks. Many previous studies use intuitive heu…
View article
Ext4 Open
The Ext4 file system is often used by Android cell phones and by Linux distributions. As a mobile forensic expert, it is necessary to understand the structures of this file system to recover data, verify tool results, and detect anti-foren…
View article
Zero knowledge based data deduplication using in-line Block Matching protocol for secure cloud storage Open
In the area of cloud computing, data deduplication enables the cloud server to store a single copy of data by eliminating redundant files to improve storage and network efficiency. Proof-of-ownership (PoW) is a cryptographic function that …
View article
Introducing Peer Copy - A Fully Decentralized Peer-to-Peer File Transfer Tool Open
It allows any two parties that are either both on the same network or connected via the internet to transfer the contents of a file based on a particular sequence of words. Peer discovery happens via multicast DNS if both peers are on the …
View article
Recovering Data Using MFT Records in NTFS File System Open
Data storage devices use a specific structure when storing or accessing the stored data. This is called file system. Before beginning to store data in the data storage device, it must be formatted absolutely. While this data storage device…
View article
Validation Analysis of Scalable Vector Graphics (SVG) File Upload using Magic Number and Document Object Model (DOM) Open
The use of technology is increasing rapidly, such as applications or services connected to the Internet. Security is considered necessary because of the growing and increasing use of digital systems. With the number of threats to attacks o…