Computer Forensics Data Recovery Software: A Comparative Study

Authors

  • Sai Niveditha Varayogula Student, Department of Forensic Science, Parul Institute of Applied Sciences, Vadodara Author
  • Kiranbhai Dodiya Research Scholar, Department of Biochemistry and Forensic Science, Gujarat University, Ahmedabad. Author
  • Parth Lakhalani Assistant professor, Department of Forensic Science, Parul Institute of Applied Sciences, Vadodara. Author
  • Arushi Chawla Assistant professor, Department of Forensic Science, Parul Institute of Applied Sciences, Vadodara. Author

DOI:

https://doi.org/10.55524/

Keywords:

Acquisition, Computer Forensic, Data Recovery, DataForensic, Digital Devices

Abstract

With the advancement of the information  technology, computer has become more important for the  people. Computer not only stores data but also increase the  channels of storing data in digital devices like pen drive,  hard disk, memory card. However, problem with these  digital devices is that if data has lost it is very difficult to  recover; so many researchers do research on it and  suggested the method of data recovery. The term data refers  to the combination of numbers or words, images, audio or  video files or even a software program. Data restore is the  procedure of recovery of information from media that is  either corrupted or damaged physically. The data recovery  software extracts the data that requires serving as an  evidence from personal computers and digital devices in  criminal cases that involve frauds, murder, corruption,  money laundering, assault, smuggling, email scams, digital  abuse, matrimonial frauds and much more. Here in this  study, we combine probably all data recovery software and  we will conclude that the best data recovery software in  forensic sound manner. This study will help in future study  to understand the overview of computer forensics data  recovery software. 

Downloads

Download data is not yet available.

References

V. D. Tran and D. J. Park, “A survey of data recovery on flash memory,” Int. J. Electr. Comput. Eng., 2020, doi: 10.11591/ijece.v10i1.pp360-376.

S. Wang, J. Yuan, X. Li, Z. Qian, F. Arena, and I. You, “Active Data Replica Recovery for Quality-Assurance Big Data Analysis in IC-IoT,” IEEE Access, 2019, doi: 10.1109/ACCESS.2019.2932259.

B. K. Oh, B. Glisic, Y. Kim, and H. S. Park, “Convolutional neural network–based data recovery method for structural health monitoring,” Struct. Heal. Monit., 2020, doi: 10.1177/1475921719897571.

L. Liu, Q. Guo, D. Liu, and Y. Peng, “Data-Driven Remaining Useful Life Prediction Considering Sensor Anomaly Detection and Data Recovery,” IEEE Access, 2019, doi: 10.1109/ACCESS.2019.2914236.

G. Fan, J. Li, and H. Hao, “Lost data recovery for structural health monitoring based on convolutional neural networks,” Struct. Control Heal. Monit., 2019, doi: 10.1002/stc.2433.

T. Zhou, Z. Cai, B. Xiao, L. Wang, M. Xu, and Y. Chen, “Location Privacy-Preserving Data Recovery for Mobile Crowdsensing,” Proc. ACM Interactive, Mobile, Wearable Ubiquitous Technol., 2018, doi: 10.1145/3264961.

J. Sahoo, S. Mohapatra, and R. Lath, “Virtualization: A survey on concepts, taxonomy and associated security issues,” 2010, doi: 10.1109/ICCNT.2010.49.

B. K. Sahu, S. Pati, P. K. Mohanty, and S. Panda, “Teaching-learning based optimization algorithm based fuzzy-PID controller for automatic generation control of multi-area power system,” Appl. Soft Comput. J., 2015, doi: 10.1016/j.asoc.2014.11.027.

S. Panda, B. K. Sahu, and P. K. Mohanty, “Design and performance analysis of PID controller for an automatic voltage regulator system using simplified particle swarm optimization,” J. Franklin Inst., 2012, doi: 10.1016/j.jfranklin.2012.06.008.

G. Das, P. K. Pattnaik, and S. K. Padhy, “Artificial Neural Network trained by Particle Swarm Optimization for non-linear channel equalization,” Expert Syst. Appl., 2014, doi: 10.1016/j.eswa.2013.10.053.

M. Biswal and P. K. Dash, “Measurement and classification of simultaneous power signal patterns with an s-transform variant and fuzzy decision tree,” IEEE Trans. Ind. Informatics, 2013, doi: 10.1109/TII.2012.2210230.

R. P. Mohanty and A. Prakash, “Green supply chain management practices in India: An empirical study,” Prod. Plan. Control, 2014, doi: 10.1080/09537287.2013.832822.

M. R. Lohokare, B. K. Panigrahi, S. S. Pattnaik, S. Devi, and A. Mohapatra, “Neighborhood search-driven accelerated biogeography-based optimization for optimal load dispatch,” IEEE Trans. Syst. Man Cybern. Part C Appl. Rev., 2012, doi: 10.1109/TSMCC.2012.2190401.

S. Panda, S. C. Swain, P. K. Rautray, R. K. Malik, and G. Panda, “Design and analysis of SSSC-based supplementary damping controller,” Simul. Model. Pract. Theory, 2010, doi: 10.1016/j.simpat.2010.04.007.

Published

2022-03-30

How to Cite

Computer Forensics Data Recovery Software: A Comparative Study . (2022). International Journal of Innovative Research in Computer Science & Technology, 10(2), 513–518. https://doi.org/10.55524/