Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity Mohammed Alhussein , Duminda Wijesekera Department of Computer Science George Mason University Fairfax, VA 22030, USA AbstractRecovering deleted information from a hard disk has been a long standing problem. The computer forensics community has addressed information recovery through the development of file carving techniques. Two issues, however, still present significant challenges to their on-going efforts 1) Prior knowledge of file types is required for building file carvers including file headers and footers, and 2) fragmentation prevents file carvers from successful recovery. As a solution, we propose a forensics file system that embeds a special identifier in every cluster that is either currently allocated or was in the past. The identifier keeps track of every cluster mapping the clusters to a single file irrespective of the file status existing or deleted. We modified an exFAT implementation on FUSE to implement our forensics file system. We also propose a hashing mechanism that can detect malicious or accidental manipulation of a cluster’s identifier. In addition, we introduce the concept of multi-version recovery, where multiple instances of a file can be recovered based on a cluster specific timestamps inserted during the write operation. Finally, using controlled experiments we have been able to verify that our proposed file system successfully recovers all deleted files in our test environment. Keywords: computer forensics; data recovery I. INTRODUCTION Computer forensics is concerned with computer systems that are involved in crimes. These computer systems can be used to aid in criminal activity. For example, criminals can utilize Internet search engines to obtain information on how to commit a physical crime. Computer systems can also be the target of a crime, such as illegally accessing a system to delete information [1]. In both cases, computer forensics attempts to preserve, collect, recover, analyze and present information from computer systems in a way that is acceptable in court [7]. One significant area of computer forensics is the recovery of evidence. An attacker can deliberately delete information where a deletion can be either the goal of the attack, such as deleting incriminating documents or videos, or the attacker can delete data within the computer system such as log files to hide the attack trail. The data recovery process is also invoked in the case of accidental deletion of data, or in cases where storage devices crash and/or get corrupted. There are many techniques used to recover data from storage devices, depending on the nature of the deleted content and the associated file system. When a user deletes a file, the file system information linking to the deleted file is kept intact, and recovery of the deleted file therefore becomes a straightforward operation in most cases. In the File Allocation Table aka “FAT” file system for example, deleting a file will result in marking the corresponding cluster entries as empty i.e., 0 in the FAT table. However, the information pointing to the actual file will still be present until the corresponding entry in the FAT table is associated with another file. In case where pointer information is no longer available in the FAT table, or if the file system itself is corrupted, data recovery becomes more challenging, requiring more sophisticated techniques in the absence of file meta-data that can lead to the location of the file within the storage unit. Such techniques are referred to as File Carving techniques. Pal et al define file carving as “a forensics technique that recovers files based merely on file structure and content and without any matching file system meta-data” [2]. Some file carvers use file structure, such as the file header written by the user application, to recover data. Conversely, more advanced file carvers will use knowledge of the file content to recover data employing statistical and/or artificial intelligence techniques. Although file carving is a powerful technique for data recovery, we highlight two issues that present challenges for forensics investigators: Prior knowledge of file types and file content File fragmentation In order for a file carver to be built, knowledge of file types and their content is required. Although many current file carvers can handle numerous file types, this is still an issue when faced with new file types. The second and more important problem is fragmentation. Recovering fragmented files present significant challenges to file carving as demonstrated in [3]. As we can see, as the number of fragments increase, the problem becomes much more difficult. Our system specifically tackles above issues. We propose a forensics file system that can help forensics investigators International Journal of Intelligent Computing Research (IJICR), Volume 4, Issue 3, September 2013 Copyright © 2013, Infonomics Society 348