Data traceless deletion method and system based on NTFS file system

A file system and file technology, applied in the field of data security, can solve problems such as the inability to delete disk data quickly and without trace, and achieve the effect of ensuring security

Active Publication Date: 2020-08-25
SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The inventor found that in the case of security threats, the exis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data traceless deletion method and system based on NTFS file system
  • Data traceless deletion method and system based on NTFS file system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] The present embodiment provides the data traceless deletion method based on NTFS file system;

[0039] The method of data deletion without trace based on NTFS file system, including:

[0040] S101: read the NTFS volume header information; analyze the NTFS volume header information; locate the starting address of the $MFT file; locate the starting address of the MFT table of the root directory ($Root);

[0041] S102: According to the MFT table of the root directory, obtain the starting address of the file content of the root directory; analyze the root directory according to the starting address of the file content of the root directory, and obtain the file record numbers of folders and files under the root directory;

[0042] S103: According to the file record numbers of folders and files in the root directory, calculate the number of file record numbers, loop through the file names corresponding to the file record numbers in turn, and determine the file name correspond...

Embodiment 2

[0099] The present embodiment provides a data traceless deletion system based on the NTFS file system;

[0100] Data traceless deletion system based on NTFS file system, including:

[0101] The reading module is configured to: read NTFS volume header information; analyze the NTFS volume header information; locate the initial address of the $MFT file; locate the initial address of the MFT table of the root directory ($Root);

[0102] The parsing module is configured to: obtain the starting address of the root directory file content according to the MFT table of the root directory; analyze the root directory according to the starting address of the root directory file content, and obtain the folders and files in the root directory document record number;

[0103] The trace removal module is configured to: calculate the number of file record numbers according to the file record numbers of the folders and files in the root directory, loop through the file names corresponding to t...

Embodiment 3

[0108] This embodiment also provides an electronic device, including: one or more processors, one or more memories, and one or more computer programs; wherein, the processor is connected to the memory, and the one or more computer programs are programmed Stored in the memory, when the electronic device is running, the processor executes one or more computer programs stored in the memory, so that the electronic device executes the method described in Embodiment 1 above.

[0109] It should be understood that in this embodiment, the processor can be a central processing unit CPU, and the processor can also be other general-purpose processors, digital signal processors DSP, application specific integrated circuits ASIC, off-the-shelf programmable gate array FPGA or other programmable logic devices , discrete gate or transistor logic devices, discrete hardware components, etc. A general-purpose processor may be a microprocessor, or the processor may be any conventional processor, o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data traceless deletion method and system based on an NTFS file system. The data traceless deletion method comprises the steps: reading NTFS volume header information; analyzing the NTFS volume header information; positioning an initial address of the MFT file; positioning an initial address of an MFT table of the root directory; according to the MFT table of the root directory, obtaining an initial address of the root directory file content; analyzing the root directory according to the initial address of the content of the root directory file to obtain a folder under the root directory and a file record number of the file; calculating the number of file record numbers according to file record numbers of folders and files under the root directory, sequentially and circularly traversing file names corresponding to the file record numbers, and judging whether the file names corresponding to the file record numbers are the same as the file names to be deleted ina traceless manner or not; if the file names are the same, deleting all traces related to the file; and if the file names are different, judging the file name corresponding to the next file record number.

Description

technical field [0001] The present disclosure relates to the technical field of data security, in particular to a method and system for deleting data without trace based on the NTFS file system. Background technique [0002] The statements in this section merely mention background art related to the present disclosure and do not necessarily constitute prior art. [0003] With the rapid development of the Internet, the informatization and networking of human society have reached an unprecedented level, and the Internet security issues have gradually become prominent. Various hackers and viruses are constantly invading our computers, stealing company confidential materials and personal privacy. Behaviors are becoming more and more common, but the victims are not aware of it. Just imagine, in the presence of network security threats, if the data stored on the hard disk is not completely deleted, once it is obtained and used by the attacker, the impact will be immeasurable of. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F16/16G06F21/62
CPCG06F16/162G06F21/6218
Inventor 杨淑棉徐淑奖王连海赵大伟韩晓晖刘广起郭秋香张睿超
Owner SHANDONG COMP SCI CENTNAT SUPERCOMP CENT IN JINAN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products