{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:14:18Z","timestamp":1763968458442,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,28]],"date-time":"2021-12-28T00:00:00Z","timestamp":1640649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shandong Provincial Key Research and Development Program","award":["2019JZZY020127, 2019JZZY020129, 2019JZZY020715, 2019JZZY010134, 2020CXGC010107, 2021CXGC010107"],"award-info":[{"award-number":["2019JZZY020127, 2019JZZY020129, 2019JZZY020715, 2019JZZY010134, 2020CXGC010107, 2021CXGC010107"]}]},{"name":"the Shandong Provincial Natural Science Foundation of China","award":["ZR2020KF035"],"award-info":[{"award-number":["ZR2020KF035"]}]},{"DOI":"10.13039\/100017052","name":"National Natural Science Foundation of China-Liaoning Joint Fund","doi-asserted-by":"publisher","award":["61702309"],"award-info":[{"award-number":["61702309"]}],"id":[{"id":"10.13039\/100017052","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Science, Education and Industry Integration Innovation Program of Qilu University of Technology (Shandong Academy of Science)","award":["2020KJC-GH11, 2020KJC-ZD02"],"award-info":[{"award-number":["2020KJC-GH11, 2020KJC-ZD02"]}]},{"name":"the National Key Research and Development Program of China","award":["2018YFB0804104"],"award-info":[{"award-number":["2018YFB0804104"]}]},{"name":"the Key Research and Development Program of Shandong Academy of Science","award":["[2019]4-5"],"award-info":[{"award-number":["[2019]4-5"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,12,28]]},"DOI":"10.1145\/3491396.3506515","type":"proceedings-article","created":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T23:54:52Z","timestamp":1641599692000},"page":"89-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Scheme of Traceless File Deletion for Windows FAT32 File System"],"prefix":"10.1145","author":[{"given":"Shujiang","family":"Xu","sequence":"first","affiliation":[{"name":"Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science, Center (National Supercomputer Center in Jinan), Qilu University of Technology, (Shandong Academy of Science), Jinan, China"}]},{"given":"Fengkai","family":"Liu","sequence":"additional","affiliation":[{"name":"Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science, Center (National Supercomputer Center in Jinan), Qilu University of Technology, (Shandong Academy of Science), Jinan, China"}]},{"given":"Lingyun","family":"Meng","sequence":"additional","affiliation":[{"name":"Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science, Center (National Supercomputer Center in Jinan), Qilu University of Technology, (Shandong Academy of Science), Jinan, China"}]},{"given":"Lianhai","family":"Wang","sequence":"additional","affiliation":[{"name":"Shandong Provincial Key Laboratory of Computer Networks, Shandong Computer Science, Center (National Supercomputer Center in Jinan), Qilu University of Technology, (Shandong Academy of Science), Jinan, China"}]},{"given":"Xu","family":"Chang","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Shandong University of Political Science and Law, Jinan, China"}]},{"given":"Weijun","family":"Yang","sequence":"additional","affiliation":[{"name":"First Research Institute of the Ministry of Public Security of PRC, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2022,1,7]]},"reference":[{"volume-title":"Challenges for Big Data Security and Privacy. Encyclopedia of Information Science and Technology (4th. ed.)","author":"Govindarajan M.","key":"e_1_3_2_1_1_1","unstructured":"Govindarajan M. , 2018. Challenges for Big Data Security and Privacy. Encyclopedia of Information Science and Technology (4th. ed.) , IGI Global. New York, NY ., 373--380. DOI: https:\/\/doi.org\/10.4018\/978-1-59140-553-5.ch165 10.4018\/978-1-59140-553-5.ch165 Govindarajan M., 2018. Challenges for Big Data Security and Privacy. Encyclopedia of Information Science and Technology (4th. ed.), IGI Global. New York, NY., 373--380. DOI: https:\/\/doi.org\/10.4018\/978-1-59140-553-5.ch165"},{"key":"e_1_3_2_1_2_1","volume-title":"IEEE Symposium on Computers and Communication (ISCC). IEEE, Messina, Italy DOI: https:\/\/doi.org\/10","author":"Gahi Y.","year":"2016","unstructured":"Gahi , Y. , Guennoun M. , and Mouftah H.T ., 2016. Big data analytics: security and privacy challenges , IEEE Symposium on Computers and Communication (ISCC). IEEE, Messina, Italy DOI: https:\/\/doi.org\/10 .1109\/ISCC. 2016 .7543859 10.1109\/ISCC.2016.7543859 Gahi, Y., Guennoun M., and Mouftah H.T., 2016. Big data analytics: security and privacy challenges, IEEE Symposium on Computers and Communication (ISCC). IEEE, Messina, Italy DOI: https:\/\/doi.org\/10.1109\/ISCC.2016.7543859"},{"key":"#cr-split#-e_1_3_2_1_3_1.1","doi-asserted-by":"crossref","unstructured":"Chen L. Liu F. and Yao D. 2017. Enterprise data breach: causes challenges prevention and future directions: Enterprise data breach Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery Wiley 7(C): e1211. DOI: https:\/\/doi.org\/10.1002\/widm.1211 10.1002\/widm.1211","DOI":"10.1002\/widm.1211"},{"key":"#cr-split#-e_1_3_2_1_3_1.2","doi-asserted-by":"crossref","unstructured":"Chen L. Liu F. and Yao D. 2017. Enterprise data breach: causes challenges prevention and future directions: Enterprise data breach Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery Wiley 7(C): e1211. DOI: https:\/\/doi.org\/10.1002\/widm.1211","DOI":"10.1002\/widm.1211"},{"issue":"1","key":"e_1_3_2_1_4_1","first-page":"161","article-title":"Review of FAT data structure of FAT32 file system","volume":"3","author":"Bhat W.A.","year":"2010","unstructured":"Bhat W.A. and Quadri S.M.K. , 2010 . Review of FAT data structure of FAT32 file system , Oriental Journal of Computer Science & Technology , 3 ( 1 ): 161 -- 164 . http:\/\/www.computerscijournal.org\/pdf\/vol3no1\/OJCSV03I01P161-164.pdf Bhat W.A. and Quadri S.M.K., 2010. Review of FAT data structure of FAT32 file system, Oriental Journal of Computer Science & Technology, 3(1): 161--164. http:\/\/www.computerscijournal.org\/pdf\/vol3no1\/OJCSV03I01P161-164.pdf","journal-title":"Oriental Journal of Computer Science & Technology"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/app9245522"},{"issue":"3","key":"e_1_3_2_1_6_1","first-page":"1116","article-title":"Child-brother tree-based deleted file recovery algorithm on Windows FAT32","volume":"26","author":"Zhang H.","year":"2009","unstructured":"Zhang H. , Liu N.Q. , and Guo J.D. , 2009 . Child-brother tree-based deleted file recovery algorithm on Windows FAT32 , Application Research of Computers , 26 ( 3 ): 1116 -- 1118 . DOI: https:\/\/doi.org\/10.1111\/j.1440-1681.2008.05051.x 10.1111\/j.1440-1681.2008.05051.x Zhang H., Liu N.Q., and Guo J.D., 2009. Child-brother tree-based deleted file recovery algorithm on Windows FAT32, Application Research of Computers, 26(3): 1116--1118. DOI: https:\/\/doi.org\/10.1111\/j.1440-1681.2008.05051.x","journal-title":"Application Research of Computers"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2012.02500"},{"key":"e_1_3_2_1_8_1","volume-title":"International Conference on Intelligent Systems Research and Mechatronics Engineering, Atlantis Press, 33-36 2015 DOI: https:\/\/doi.org\/110","author":"Zhang N.","year":"2015","unstructured":"Zhang N. , and Wang J ., 2015. Research of file recovery in Windows FAT32 . International Conference on Intelligent Systems Research and Mechatronics Engineering, Atlantis Press, 33-36 2015 DOI: https:\/\/doi.org\/110 .2991\/isrme-15. 2015 .9 Zhang N., and Wang J., 2015. Research of file recovery in Windows FAT32. International Conference on Intelligent Systems Research and Mechatronics Engineering, Atlantis Press, 33-36 2015 DOI: https:\/\/doi.org\/110.2991\/isrme-15.2015.9"},{"volume-title":"11th International Symposium on Cyberspace Safety and Security, Springer, Cham, 467--476","author":"Chang X.","key":"e_1_3_2_1_9_1","unstructured":"Chang X. , Hao F.C. , Wu J. , and Feng G.R ., 2019. File recovery of high-order clearing first cluster based on FAT32 , 11th International Symposium on Cyberspace Safety and Security, Springer, Cham, 467--476 . DOI: https:\/\/doi.org\/10.1007\/978-3-030-37337-5_38 10.1007\/978-3-030-37337-5_38 Chang X., Hao F.C., Wu J., and Feng G.R., 2019. File recovery of high-order clearing first cluster based on FAT32, 11th International Symposium on Cyberspace Safety and Security, Springer, Cham, 467--476. DOI: https:\/\/doi.org\/10.1007\/978-3-030-37337-5_38"},{"key":"e_1_3_2_1_10_1","volume-title":"International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), ientiane, Laos, 644--647","author":"Zhang N.","year":"2020","unstructured":"Zhang N. , Jiang Y. , and Wang J ., 2020. The Research of data recovery on Windows file systems , International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), ientiane, Laos, 644--647 . DOI: https:\/\/doi.org\/10.1109\/ICITBS49701. 2020 .00141 10.1109\/ICITBS49701.2020.00141 Zhang N., Jiang Y., and Wang J., 2020. The Research of data recovery on Windows file systems, International Conference on Intelligent Transportation, Big Data & Smart City (ICITBS), ientiane, Laos, 644--647. DOI: https:\/\/doi.org\/10.1109\/ICITBS49701.2020.00141"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.06.008"},{"key":"e_1_3_2_1_12_1","first-page":"185","article-title":"Assessing trace evidence left by secure deletion programs, IFIP Advances in Information and Communication, Springer, Boston","volume":"222","author":"Burke P.","year":"2006","unstructured":"Burke P. , and Craiger P. , 2006 . Assessing trace evidence left by secure deletion programs, IFIP Advances in Information and Communication, Springer, Boston , MA. 222 : 185 -- 195 . DOI: https:\/\/doi.org\/10.1007\/978-0-387-36891-7_15 10.1007\/978-0-387-36891-7_15 Burke P., and Craiger P., 2006. Assessing trace evidence left by secure deletion programs, IFIP Advances in Information and Communication, Springer, Boston, MA. 222: 185--195. DOI: https:\/\/doi.org\/10.1007\/978-0-387-36891-7_15","journal-title":"MA."},{"key":"e_1_3_2_1_13_1","first-page":"237","article-title":"Methods for detecting and analyzing hidden FAT32 volumes created with the use of cryptographic tools, In: New Results in Dependability and Computer Systems. Advances in Intelligent Systems and Computing, Springer","volume":"224","author":"J\u00f3\u017awiak I.","year":"2013","unstructured":"J\u00f3\u017awiak I. , K\u0119dziora M. , and Meli\u0144ska A. , 2013 . Methods for detecting and analyzing hidden FAT32 volumes created with the use of cryptographic tools, In: New Results in Dependability and Computer Systems. Advances in Intelligent Systems and Computing, Springer , Heidelberg , 224 : 237 -- 244 . DOI: https:\/\/doi.org\/10.1007\/978-3-319-00945-2_21 10.1007\/978-3-319-00945-2_21 J\u00f3\u017awiak I., K\u0119dziora M., and Meli\u0144ska A., 2013. Methods for detecting and analyzing hidden FAT32 volumes created with the use of cryptographic tools, In: New Results in Dependability and Computer Systems. Advances in Intelligent Systems and Computing, Springer, Heidelberg, 224: 237--244. DOI: https:\/\/doi.org\/10.1007\/978-3-319-00945-2_21","journal-title":"Heidelberg"},{"issue":"9","key":"e_1_3_2_1_14_1","first-page":"176","article-title":"Computer forensics research and implementation based on FAT32 file system","volume":"35","author":"Wang Z.S.","year":"2009","unstructured":"Wang Z.S. , Liu N.Q. , Qin K. , and Hao Y.J. , 2009 . Computer forensics research and implementation based on FAT32 file system , Computer Engineering , 35 ( 9 ): 176 -- 178 . DOI: https:\/\/doi.org\/10.1115\/MNHMT2009-18287 10.1115\/MNHMT2009-18287 Wang Z.S., Liu N.Q., Qin K., and Hao Y.J., 2009. Computer forensics research and implementation based on FAT32 file system, Computer Engineering, 35(9): 176--178. DOI: https:\/\/doi.org\/10.1115\/MNHMT2009-18287","journal-title":"Computer Engineering"},{"issue":"8","key":"e_1_3_2_1_15_1","first-page":"1487","article-title":"A Method for Reconstructing the FAT File System from Flash Memory","volume":"41","author":"Zhang L.","year":"2013","unstructured":"Zhang L. , Tan Y.A. , Zheng J. , Ma Z.M. , Wang W.M. , and Li Y.Z. , 2013 . A Method for Reconstructing the FAT File System from Flash Memory , Acta Electronica Sinica , 41 ( 8 ): 1487 -- 1493 . DOI: https:\/\/doi.org\/10.3969\/j.issn.0372-2112.2013.08.006 10.3969\/j.issn.0372-2112.2013.08.006 Zhang L., Tan Y.A., Zheng J., Ma Z.M., Wang W.M., and Li Y.Z., 2013. A Method for Reconstructing the FAT File System from Flash Memory, Acta Electronica Sinica, 41(8):1487--1493. DOI: https:\/\/doi.org\/10.3969\/j.issn.0372-2112.2013.08.006","journal-title":"Acta Electronica Sinica"},{"key":"e_1_3_2_1_16_1","first-page":"6","article-title":"Microsoft Extensible Firmware Initiative FAT32 File System Specification FAT: General Overview of On-Disk Format","volume":"1","author":"Microsoft Corporation","year":"2000","unstructured":"Microsoft Corporation , 2000 . Microsoft Extensible Firmware Initiative FAT32 File System Specification FAT: General Overview of On-Disk Format , Version 1 .03, December 6 . https:\/\/download.microsoft.com\/download\/0\/8\/4\/084c452b-b772-4fe5-89bb-a0cbf082286a\/fatgen103.doc Microsoft Corporation, 2000. Microsoft Extensible Firmware Initiative FAT32 File System Specification FAT: General Overview of On-Disk Format, Version 1.03, December 6. https:\/\/download.microsoft.com\/download\/0\/8\/4\/084c452b-b772-4fe5-89bb-a0cbf082286a\/fatgen103.doc","journal-title":"Version"}],"event":{"name":"ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Jinan China","acronym":"ACM ICEA '21"},"container-title":["Proceedings of the 2021 ACM International Conference on Intelligent Computing and its Emerging Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506515","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491396.3506515","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:47Z","timestamp":1750188647000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491396.3506515"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,28]]},"references-count":17,"alternative-id":["10.1145\/3491396.3506515","10.1145\/3491396"],"URL":"https:\/\/doi.org\/10.1145\/3491396.3506515","relation":{},"subject":[],"published":{"date-parts":[[2021,12,28]]},"assertion":[{"value":"2022-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}