Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification

Objective. The objective of the study is software analysis of hashing, compression and recovery methods and development of a software module on this basis.Method. Hashing algorithms were used in the study.Result. The possible functionality of the software tool and organized integrity checking mechan...

Full description

Saved in:
Bibliographic Details
Main Authors: L. V. Cherkesova, V. A. Savelyev, E. A. Revyakina, A. R. Polulyakh, M. A. Sementsov
Format: Article
Language:Russian
Published: Dagestan State Technical University 2025-04-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/1708
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850023158712631296
author L. V. Cherkesova
V. A. Savelyev
E. A. Revyakina
A. R. Polulyakh
M. A. Sementsov
author_facet L. V. Cherkesova
V. A. Savelyev
E. A. Revyakina
A. R. Polulyakh
M. A. Sementsov
author_sort L. V. Cherkesova
collection DOAJ
description Objective. The objective of the study is software analysis of hashing, compression and recovery methods and development of a software module on this basis.Method. Hashing algorithms were used in the study.Result. The possible functionality of the software tool and organized integrity checking mechanisms by using hash tables and restoring a file from a backup copy are presented. The software module uses the developed algorithm that allows eliminating vulnerabilities associated with program integrity, as well as significantly reducing the impact of malicious algorithms on file integrity. A comparative analysis with existing analogs is carried out for the developed software tool, as well as a graphical representation of the algorithm's performance, showing the dependence of time on the number of files. To develop the software module, a reversible incremental backup algorithm was chosen as the most suitable for the developed algorithm and more convenient to use.Conclusion. The proposed data recovery mechanism is a modern solution that ensures the safety of personal files in case of their damage. The main tasks for future improvement of the software tool have been defined: expanding the functionality of the software tool; optimizing the program code to achieve greater performance; updating and improving the software modules; adding disk image copy functions.
format Article
id doaj-art-a1e91d6672e84bc1850d636a71ad6b54
institution DOAJ
issn 2073-6185
2542-095X
language Russian
publishDate 2025-04-01
publisher Dagestan State Technical University
record_format Article
series Вестник Дагестанского государственного технического университета: Технические науки
spelling doaj-art-a1e91d6672e84bc1850d636a71ad6b542025-08-20T03:01:28ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2025-04-0152113414610.21822/2073-6185-2025-52-1-134-146964Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modificationL. V. Cherkesova0V. A. Savelyev1E. A. Revyakina2A. R. Polulyakh3M. A. Sementsov4Don State Technical UniversityDon State Technical UniversityDon State Technical UniversityDon State Technical UniversityDon State Technical UniversityObjective. The objective of the study is software analysis of hashing, compression and recovery methods and development of a software module on this basis.Method. Hashing algorithms were used in the study.Result. The possible functionality of the software tool and organized integrity checking mechanisms by using hash tables and restoring a file from a backup copy are presented. The software module uses the developed algorithm that allows eliminating vulnerabilities associated with program integrity, as well as significantly reducing the impact of malicious algorithms on file integrity. A comparative analysis with existing analogs is carried out for the developed software tool, as well as a graphical representation of the algorithm's performance, showing the dependence of time on the number of files. To develop the software module, a reversible incremental backup algorithm was chosen as the most suitable for the developed algorithm and more convenient to use.Conclusion. The proposed data recovery mechanism is a modern solution that ensures the safety of personal files in case of their damage. The main tasks for future improvement of the software tool have been defined: expanding the functionality of the software tool; optimizing the program code to achieve greater performance; updating and improving the software modules; adding disk image copy functions.https://vestnik.dgtu.ru/jour/article/view/1708hashingrecoverymechanismprotectionhash-functionsharle
spellingShingle L. V. Cherkesova
V. A. Savelyev
E. A. Revyakina
A. R. Polulyakh
M. A. Sementsov
Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification
Вестник Дагестанского государственного технического университета: Технические науки
hashing
recovery
mechanism
protection
hash-function
sha
rle
title Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification
title_full Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification
title_fullStr Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification
title_full_unstemmed Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification
title_short Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification
title_sort mechanism for data recovery as a result of data corruption infection and or unauthorized modification
topic hashing
recovery
mechanism
protection
hash-function
sha
rle
url https://vestnik.dgtu.ru/jour/article/view/1708
work_keys_str_mv AT lvcherkesova mechanismfordatarecoveryasaresultofdatacorruptioninfectionandorunauthorizedmodification
AT vasavelyev mechanismfordatarecoveryasaresultofdatacorruptioninfectionandorunauthorizedmodification
AT earevyakina mechanismfordatarecoveryasaresultofdatacorruptioninfectionandorunauthorizedmodification
AT arpolulyakh mechanismfordatarecoveryasaresultofdatacorruptioninfectionandorunauthorizedmodification
AT masementsov mechanismfordatarecoveryasaresultofdatacorruptioninfectionandorunauthorizedmodification