In this work, anti-forensics of data in classical and quantum computers over the classical communication channel, storage devices are discussed. The general methodology to apply anti - forensics in storage media without using expensive tools and with low risk of detection on both classical and quantum computers are compared.
Published In:IJCSN Journal Volume 9, Issue 4
Date of Publication : August 2020
Pages : 160-162
Figures :--
Tables : --
Divya Shree S :
member IEEE is currently pursuing Masters degree in Computer Science and Engineering in BMS Institute of Technology and Management. She has 4 years of work experience as a software test engineer. Currently she has a publicatiuon in SPIE Conference. Research interests include but not limited to Complex modeling, Quantum Computing.
Dr.
Anjan Koundinya K :
senior IEEE member is B. E, MTech and
PhD in Computer Science and Engineering. He has been awarded
Best Performer PG 2010, First Rank Holder (M. Tech CSE 2010)
and recipient of Best Doctoral Thesis Award by BITES, Karnataka
for the academic year 2016 17. He has served in industry and
academia in various capacities for more than a decade. He is
currently working as Associate Professor in Dept. of Computer
Science and Engineering, BMS Institute of Technology and
Management, Bengaluru.
This document develops a common methodology for applying anti - forensics to storage media using a communication channel without an expensive set of tools and low risk of detection in classic computer systems. On the other hand, a light is shed on the risk of anti - forensics on the quantum system in a totally different computing paradigm.
[1] Nina Godbole, Sunit Belapure,"Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives", Wiley India Pvt Ltd, ISBN: 978-81-265-21791, Publish Date 2013
[2] Wikipedia link "https://en.wikipedia.org/wiki/Anti-computer forensics"
[3] H. Baier and J. Knauer, "AFAUC -- Anti-forensics of Storage Devices by Alternative Use of Communication Channels," 2014 Eighth International Conference on IT Security Incident Management & IT Forensics, Munster, 2014, pp. 14-26
[4] Michael A. Nielsen, Isaac L. Chaung, "Quantum Computation and Quantum Information", Cambridge University Press
[5] David McMahon, "Quantum Computing Explained", WILEY- INTERSCIENCEA John Wiley & Sons, Inc., Publication
[6] D. P. DiVincenzo, D. W. Leung and B. M. Terhal, "Quantum data hiding," in IEEE Transactions on Information Theory, vol. 48, no. 3, pp. 580-598, March 2002.
[7] A. Srinivasan, S. T. Nazaraj and A. Stavrou, "HIDEINSIDE - A novel randomized & encrypted antiforensic information hiding," 2013 International Conference on Computing, Networking and Communications (ICNC), San Diego, CA, 2013, pp. 626-631, doi: 10.1109/ICCNC.2013.6504159
[8] C. DOrazio, A. Ariffin and K. R. Choo, "iOS Anti-forensics: How Can We Securely Conceal, Delete and Insert Data?," 2014 47th Hawaii International Conference on System Sciences, Waikoloa, HI, 2014, pp. 4838-4847, doi: 10.1109/HICSS.2014.594.
[9] A. A. Abd El-Latif, B. Abd-El-Atty, M. S. Hossain, M. A. Rahman, A. Alamri and B. B. Gupta, "Efficient Quantum Information Hiding for Remote Medical Image Sharing," in IEEE Access, vol. 6, pp. 21075-21083, 2018, doi: 10.1109/ACCESS.2018.2820603.