Forensic Aspects of Flash Memory and Retrieval of Deleted Information
Keywords:
Forensics Investigation, AES Encryption, Digital Forensics Model, Digital Signatures, Flash DevicesAbstract
Flash memory devices are considering efficient storage units; thus, it is producing tremendous demands for the usage of obtrusive memory devices. One of the severe problems that forensic investigators face is to remove deleted information from flash memory devices, as some of the flash memory machines prevent the reduction of eradicating data using the standard rhetorical techniques. This is to be taken into consideration by a study of the physics of flash retention, the development of trendy transition, layers, and the file systems that support these devices. It then regulates forensic experiments on various types of flash-based data-storage medium and encapsulates the results of each media. The paper also refers to the search for various practices to be applied to flash storage media, which helps to enable them to retrieve deleted information with the use of standard forensic techniques. The investigation includes the preservation of the organization, the search for digital indication, and the renovation of digital events. The focus of the examination is on the renovation of events using evidence so that suggestions can be developed and tested. In real world, the receiver of message needs guarantee that the message belongs to the sender and he should not be able to reject the establishment of that message.
References
- Shivendran Divakar Tiruchanpalli, ”Forensic Aspects of Various Flash Memory Devices (Dec 2019)”, St. Cloud State University.
- Krishnun Sansurooah, “A forensics overview and analysis of USB flash memory devices (Dec 2009)”, Edith Cowan University, Australia.
- Jeong UK Kang, Heeseung Jo, Jinn-Soo-Kim, Joonwon Lee, “A superblock-based flash translation layer for NAND flash memory (Oct 2006)”, Korea. https://dl.acm.org/doi/abs/10.1145/1176887.1176911
- Abhilash Garg, Supriya Chakraborty “Investigation of Data Deletion Vulnerabilities Storage (Jan 2020)”, India.
- Woodford, C. (2017, June 29). Flash memory. Retrieved from ExplainThatStuff: http://www.explainthatstuff.com/flashmemory.html
- Aya Fukami, Saugata Ghose, Yixin Luo, Yu Cai, Onur Mutlu, “Digital Investigation (Jan 2017)”, Europe.
- Sonia Bui, Michelle Enyeart, Jenghuei Luong,” Issues in Computers forensics (May 2003)”, COEN 150
- Derek Bem and Ewa Huebner, “Analysis of USB Flash Drives in a Virtual Environment (June 2007)”, Small Scale Digital Device Forensics Journal, VOL. 1, NO.1.
- Yatendra Kumar Gupta,”Systematic Digital Forensic Investigation Model”, (March 2016).
- David A. Dampier 3 Arafat AL-Dhaqm1, Shukor Abd Razak 2 ,“ (IEEE) Categorization and Organization of Database Forensic Investigation Processes (June 2020)” Research Management Centre, Xiamen University Malaysia under the XMUM Research DOI:10.1109XXXXXXX.XXXX.3000747
- Avinash Kumar, Ashar Neyaz & Narasimha Shashidhar, “A Survey On Solid-State Drive Forensic Analysis Techniques”, International Journal of Computer Science and Security (IJCSS) 14 (2), 13-21 2020.USA
- Nikunj Pansari and Dhruwal Kushwaha, “Forensic analysis and investigation using digital forensics- An overview” ISSN: 2454-132X, Uttar Pradesh.
- B.Padmavathi, S.Ranjitha Kumari,“A Survey on Performance Analysis of DES, AES & RSA Algorithm along with LSB Substitution Technique” India.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.