E-Raser: File Shredder Application With Content Replacement by Using Random Words Function
DOI: http://dx.doi.org/10.30630/joiv.2.4-2.175
Abstract
Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. The addressable problem with existence of file recovery tools is it may lead to data leakage, exploitation or dissemination from an unauthorized person. Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. The implemented algorithm replaced the original content of the files with uninformative words provided by the application. After rewriting phase is complete, shredding process take place to make the file unrecoverable. Object Oriented Software Development was used as the methodology to develop this application. As a result, E-Raser achieved the objectives to add, remove, rewrite, display and shred files. Also, E-Raser is significantly facilitates users to securely dispose their file, protect the confidentiality and privacy of the file’s content.
Keywords
Full Text:
PDFReferences
Kishi, G. T. (2007). U.S. Patent No. 7,308,543. Washington, DC: U.S. Patent and Trademark Office.
Yasinsac, A., & Manzano, Y. (2001, June). Policies to enhance computer and network forensics. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security (pp. 289-295).
Quinton, M. (2015, August 4). Old laptop you wiped clean‟ can still be used by fraudsters. The Sun. Retrieved from https://www.thesun.co.uk
Census data revisited. (n.d). Retrieved October 13,2016, from Kryptel website, http://www.kryptel.com/articles/shredding.php
Wei, M. Y. C., Grupp, L. M., Spada, F. E., & Swanson, S. (2011, February). Reliably Erasing Data from Flash-Based Solid State Drives. In FAST (Vol. 11, pp. 8-8).
Bennison, P. F., & Lasher, P. J. (2005). Data security issues relating to end of life equipment. Journal of ASTM International, 2(4), 1-7.
Forte, D., & Power, R. (2007). A tour through the realm of antiforensics.Computer Fraud & Security, 2007(6), 18-20.
Ferguson, N., & Schneier, B. (2003). Practical cryptography (Vol. 23). New York: Wiley
Acronis DriveCleanser User's Guide Copyright © Acronis, Inc., 2000-2005
Gutmann, Peter (1996): Secure Deletion of Data from Magnetic and Solid-State Memory, In SSYM‟96:Proceedings of the 6th Conference on USENIX Security Symposium, Berkeley, CA, USA, USENIX Association.
Schneier, B.(1995). Applied Cryptography: Protocols, Algorithms, and Source Code in C (Second Edition), John Wiley & Sons, Inc.
Tim, F. (2016, August 27). What is the VSITR Method? Details on the VSITR Data Wipe Method. Retrieved from http://pcsupport.about.com/od/termsv/g/vsitr.htm.
Census data revisited. (n.d). Retrieved October 13,2016, from Piriform website, https://www.piriform.com/recuva
Kamblea, D. R., Jainb, N., & Deshpandec, S. (2015). Comparison of Digital Forensic tools used in DFAI system. History, 2(6)
Census data revisited. (n.d). Retrieved October 13, 2016, from Eraser website, https://eraser.heidi.ie/
Census data revisited. (n.d). Retrieved October 13, 2016, from Alternate File Shredder website, http://www.alternatetools.com/pages/c_fileshredder.php
Census data revisited. (n.d). Retrieved October 13,2016, from Freeraser website, http://www.freeraser.com/