Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search

Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification

https://doi.org/10.21822/2073-6185-2025-52-1-134-146

Abstract

Objective. The objective of the study is software analysis of hashing, compression and recovery methods and development of a software module on this basis.

Method. Hashing algorithms were used in the study.

Result. The possible functionality of the software tool and organized integrity checking mechanisms by using hash tables and restoring a file from a backup copy are presented. The software module uses the developed algorithm that allows eliminating vulnerabilities associated with program integrity, as well as significantly reducing the impact of malicious algorithms on file integrity. A comparative analysis with existing analogs is carried out for the developed software tool, as well as a graphical representation of the algorithm's performance, showing the dependence of time on the number of files. To develop the software module, a reversible incremental backup algorithm was chosen as the most suitable for the developed algorithm and more convenient to use.

Conclusion. The proposed data recovery mechanism is a modern solution that ensures the safety of personal files in case of their damage. The main tasks for future improvement of the software tool have been defined: expanding the functionality of the software tool; optimizing the program code to achieve greater performance; updating and improving the software modules; adding disk image copy functions.

About the Authors

L. V. Cherkesova
Don State Technical University
Russian Federation

Larisa V. Cherkesova, Dr. Sci. (Physics and Mathematics), Prof., Prof., Department «Cybersecurity of information Systems»,

1 Gagarin Square, Rostov-on-Don 344000



V. A. Savelyev
Don State Technical University
Russian Federation

Vasily A. Savel'ev, Cand. Sci. (Physics and Mathematics), Assoc. Prof., Assoc. Prof., Department «Cybersecurity of information Systems»,

1 Gagarin Square, Rostov-on-Don 344000



E. A. Revyakina
Don State Technical University
Russian Federation

Elena A. Revyakina, Cand. Sci. (Physics and Mathematics), Assoc. Prof., Assoc. Prof., Department «Cybersecurity of information systems»,

1 Gagarin Square, Rostov-on-Don 344000



A. R. Polulyakh
Don State Technical University
Russian Federation

Anatoly R. Polulyakh, Student, Department «Cybersecurity of information Systems»,

1 Gagarin Square, Rostov-on-Don 344000



M. A. Sementsov
Don State Technical University
Russian Federation

Maxim A. Semencov, Student, Department «Cybersecurity of information systems»,

1 Gagarin Square, Rostov-on-Don 344000



References

1. Telegin V.A. Analysis of cryptographic resistance of the modified md5 algorithm. Universum: technical sciences, 2023; 9-2 (114):16-20. (In Russ).

2. Klimenko S.V., Yakovlev V.V., Blagoveshchenskaya E.A. Study of implementations of CRC32 checksum algorithms. Bulletin of the Petersburg State University of Railway Engineering, 2018; 15(3): 471-477. (In Russ).

3. Astakhov S.V., Varihanov D.I. SHA-256 hash function calculator. Polytechnic Youth Journal, 2023; 08 (85). URL: http://dx.doi.org/10.18698/2541-8009-2023-8-924 (date of access 3.10.2023). (In Russ).

4. Erdman A.A. "Implementation of the Lempel-Ziv LZ77 data compression algorithm in the Python programming language." Postulate. 2023;1. (In Russ).

5. Andrienko I.S. "Development of the RLE data compression algorithm in the Python programming language." Postulate. 2023;1. (In Russ).

6. Zvaigzne A.Yu. "Creation of a text data compression algorithm in the Python programming language." Postulate. 2023;1. (In Russ).

7. Chumburidze Ya.A. "Basic backup methods to ensure information security" International Journal of Humanities and Natural Sciences, 2023; 3-2 (78):57–60. (In Russ).

8. Bopp V. A. "Features of choosing backup systems" Bulletin of Tula State University. Technical sciences, 2019; 10:297–300. (In Russ).

9. Official website of the Visual Code software environment. URL: https://code.visualstudio.com/docs, accessed 11/12/2023.

10. Official website of the cross-platform environment for developing the QtDesigner graphical shell. URL: https://doc.qt.io/qt-6/qtdesigner-manual.html, accessed 11/16/2023.

11. Official website of the Python programming language. URL: https://www.python.org/doc/,accessed 19.11.2023.

12. Import-substituting technologies for ensuring information security and data protection: a tutorial / D.A. Korochentsev, L.V. Cherkesova, E.A. Revyakina [et al.]. Rostov-on-Don: Donskoy GTU, 2021;335(In Russ).

13. Development of a real-time document approval system Cherckesova L., Boldyrikhin N., Revyakina E., Safaryan O., Yengibaryan I. In the collection: E3S Web of Conferences. 14th Inter-national Scientific and Practical Conference on State and Prospects for the Development of Agribusiness, INTERAGROMASH 2021. Rostov-on-Don, 2021: 08047.


Review

For citations:


Cherkesova L.V., Savelyev V.A., Revyakina E.A., Polulyakh A.R., Sementsov M.A. Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification. Herald of Dagestan State Technical University. Technical Sciences. 2025;52(1):134-146. (In Russ.) https://doi.org/10.21822/2073-6185-2025-52-1-134-146

Views: 82


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)