E-Raser: File Shredder Application With Content Replacement by Using Random Words Function

Nur Farah Aqilah Mohd Nahar - University Tun Hussein Onn Malaysia, Johor, Malaysia
Nurul Hidayah Ab Rahman - University Tun Hussein Onn Malaysia, Johor, Malaysia
Kamarudin Malik Mohammad - University Tun Hussein Onn Malaysia, Johor, Malaysia


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.2.4-2.175

Abstract


Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. The addressable problem with existence of file recovery tools is it may lead to data leakage, exploitation or dissemination from an unauthorized person. Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. The implemented algorithm replaced the original content of the files with uninformative words provided by the application. After rewriting phase is complete, shredding process take place to make the file unrecoverable. Object Oriented Software Development was used as the methodology to develop this application. As a result, E-Raser achieved the objectives to add, remove, rewrite, display and shred files. Also, E-Raser is significantly facilitates users to securely dispose their file, protect the confidentiality and privacy of the file’s content.


Keywords


data shredding; file shredder; overwriting; unrecoverable file.

Full Text:

PDF

References


Kishi, G. T. (2007). U.S. Patent No. 7,308,543. Washington, DC: U.S. Patent and Trademark Office.

Yasinsac, A., & Manzano, Y. (2001, June). Policies to enhance computer and network forensics. In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security (pp. 289-295).

Quinton, M. (2015, August 4). Old laptop you wiped clean‟ can still be used by fraudsters. The Sun. Retrieved from https://www.thesun.co.uk

Census data revisited. (n.d). Retrieved October 13,2016, from Kryptel website, http://www.kryptel.com/articles/shredding.php

Wei, M. Y. C., Grupp, L. M., Spada, F. E., & Swanson, S. (2011, February). Reliably Erasing Data from Flash-Based Solid State Drives. In FAST (Vol. 11, pp. 8-8).

Bennison, P. F., & Lasher, P. J. (2005). Data security issues relating to end of life equipment. Journal of ASTM International, 2(4), 1-7.

Forte, D., & Power, R. (2007). A tour through the realm of antiforensics.Computer Fraud & Security, 2007(6), 18-20.

Ferguson, N., & Schneier, B. (2003). Practical cryptography (Vol. 23). New York: Wiley

Acronis DriveCleanser User's Guide Copyright © Acronis, Inc., 2000-2005

Gutmann, Peter (1996): Secure Deletion of Data from Magnetic and Solid-State Memory, In SSYM‟96:Proceedings of the 6th Conference on USENIX Security Symposium, Berkeley, CA, USA, USENIX Association.

Schneier, B.(1995). Applied Cryptography: Protocols, Algorithms, and Source Code in C (Second Edition), John Wiley & Sons, Inc.

Tim, F. (2016, August 27). What is the VSITR Method? Details on the VSITR Data Wipe Method. Retrieved from http://pcsupport.about.com/od/termsv/g/vsitr.htm.

Census data revisited. (n.d). Retrieved October 13,2016, from Piriform website, https://www.piriform.com/recuva

Kamblea, D. R., Jainb, N., & Deshpandec, S. (2015). Comparison of Digital Forensic tools used in DFAI system. History, 2(6)

Census data revisited. (n.d). Retrieved October 13, 2016, from Eraser website, https://eraser.heidi.ie/

Census data revisited. (n.d). Retrieved October 13, 2016, from Alternate File Shredder website, http://www.alternatetools.com/pages/c_fileshredder.php

Census data revisited. (n.d). Retrieved October 13,2016, from Freeraser website, http://www.freeraser.com/