CN104036201A - Application-layer file hiding method on Windows operating system - Google Patents
Application-layer file hiding method on Windows operating system Download PDFInfo
- Publication number
- CN104036201A CN104036201A CN201410286953.9A CN201410286953A CN104036201A CN 104036201 A CN104036201 A CN 104036201A CN 201410286953 A CN201410286953 A CN 201410286953A CN 104036201 A CN104036201 A CN 104036201A
- Authority
- CN
- China
- Prior art keywords
- file
- operating system
- hiding
- sector
- sector number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域 technical field
本发明属于信息安全领域,具体涉及到一种Windows操作系统下的应用层文件隐藏方法。主要提供一种Windows操作系统下的轻量级的文件隐藏,使文件具有较高的安全性以及数据完整性。涉及的技术主要有:Windows平台下直接操作磁盘扇区进行文件的隐藏和读取技术。 The invention belongs to the field of information security, and in particular relates to an application layer file hiding method under the Windows operating system. It mainly provides a lightweight file hiding under the Windows operating system, so that the files have higher security and data integrity. The technologies involved mainly include: directly operating the disk sector under the Windows platform to hide and read files.
背景技术 Background technique
随着互联网的发展,计算机的日益普及,网络中传递的信息呈现爆炸式的增长,与此同时,电脑病毒的数量也与日俱增,而且危害也越来越大,加上Internet的日益完善,上网成为计算机用户日常生活的一部分,但网上黑客的猖獗又进一步威胁到计算机用户数据的安全和正常的使用。目前,由于计算机上文件被窃取造成损失的例子比比皆是。 With the development of the Internet and the increasing popularity of computers, the information transmitted on the network has shown an explosive growth. At the same time, the number of computer viruses is also increasing day by day, and the harm is also increasing. It is a part of the daily life of computer users, but the rampant hackers on the Internet further threaten the security and normal use of computer user data. Currently, there are many examples of losses caused by the theft of files on computers.
对于信息的保护,传统的方式是采用加密技术,即把文件继续进行加密。加密技术与具体的操作系统无关,使用时在进行解密,从而达到保护文件的目的。但是加密技术有一定的局限性,它的保密强度依赖于所采用的加密算法和密钥强度,而且一旦忘记密钥,恢复起来很困难。并且,加密也不能防止文件被窃取,一旦被窃取,就存在被解密的风险。 For the protection of information, the traditional method is to use encryption technology, that is, to continue to encrypt files. The encryption technology has nothing to do with the specific operating system, and it is decrypted when it is used, so as to achieve the purpose of protecting files. However, encryption technology has certain limitations. Its confidentiality depends on the encryption algorithm and key strength used, and once the key is forgotten, it is very difficult to recover. Moreover, encryption cannot prevent files from being stolen. Once stolen, there is a risk of being decrypted.
还有一种文件隐藏的方式是基于文件系统本身的特性的隐藏,这种方式主要与文件系统相关,而不是依赖于所运行的操作系统。对于NTFS文件系统而言,专利“基于NTFS磁盘文件系统结构的文件隐藏方法(申请号:03118546.0)”中提出了一种通过数据流来进行文件隐藏的方法。但是这种方法需要拷贝文件到流当中,而且限制在NTFS文件系统中,局限性较大。 There is another way of file hiding based on the characteristics of the file system itself. This way is mainly related to the file system, rather than depending on the running operating system. For the NTFS file system, the patent "File Hiding Method Based on NTFS Disk File System Structure (Application No.: 03118546.0)" proposes a method for hiding files through data streams. However, this method needs to copy the file to the stream, and it is limited to the NTFS file system, which has relatively large limitations.
专利“NTFS文件系统下轻量级文件隐藏方法(申请号: CN200910045412.6)”中提到的一种直接在文件索引中删除要隐藏文件对应的索引记录的方法,可隐藏任意文件,且效率不受文件大小影响。但是该方法没有考虑数据被覆盖的情况,当文件记录被删除以后,$Bitmap元文件的相应位会被标志为未使用,以后的文件将会覆盖之前隐藏的数据。 A method of directly deleting the index record corresponding to the file to be hidden in the file index mentioned in the patent "Lightweight file hiding method under NTFS file system (application number: CN200910045412.6)", which can hide any file, and the efficiency Not affected by file size. However, this method does not consider the situation of data being overwritten. When the file record is deleted, the corresponding bit of the $Bitmap metafile will be marked as unused, and future files will overwrite the previously hidden data.
专利“Windows系统下实现利用磁盘隐藏扇区保护数据的方法(申请号:02155511.7)”通过硬盘HPA对文件进行隐藏,此方法通过创建磁盘HPA,对HPA进行管理来实现文件的隐藏。但是这种方法对HPA系统依赖较大,而且可能需要对现有分区进行改动,操作不便。 The patent "A method for protecting data by using disk hidden sectors under Windows system (application number: 02155511.7)" hides files through hard disk HPA. This method realizes file hiding by creating disk HPA and managing HPA. However, this method relies heavily on the HPA system, and may need to modify existing partitions, which is inconvenient to operate.
发明内容 Contents of the invention
针对上述现有技术的缺点,本发明的目的在于提出一种基于Windows操作系统的文件隐藏方法,通过对磁盘分区间隙和磁盘保留扇区的利用,实现对指定文件的隐藏,解决数据文件安全性和完整性问题。 For above-mentioned shortcoming of prior art, the object of the present invention is to propose a kind of file hiding method based on Windows operating system, realize the hiding of specified file by utilizing the disk partition gap and disk reserved sector, solve the data file security and integrity issues.
为解决上述问题,本发明采用如下的技术方案: In order to solve the above problems, the present invention adopts the following technical solutions:
一种Windows操作系统下的应用层文件隐藏方法,包括数据隐藏方法以及用于隐藏数据恢复的数据读取方法,其中,所述的文件隐藏方法的具体步骤为: An application layer file hiding method under the Windows operating system, including a data hiding method and a data reading method for hiding data recovery, wherein the specific steps of the file hiding method are:
步骤a1、遍历Windows操作系统下的磁盘分区表,找到每个分区的起始扇区号和结束扇区号,找到磁盘末尾扇区的扇区号。 Step a1, traversing the disk partition table under the Windows operating system, finding the start sector number and the end sector number of each partition, and finding the sector number of the last sector of the disk.
步骤a2、根据第一步找到的分区信息,计算得到可以利用的分区间隙和末尾可用扇区。 Step a2, according to the partition information found in the first step, calculate the available partition gap and the last available sector.
步骤a3、组织获取到的零散的可利用扇区,形成一个完整的可利用空间。步骤a4、对第三步中获得的空间进行初始化,设置相应的数据机构,记录本小型文件系统的相关信息。 Step a3, organizing the obtained fragmented available sectors to form a complete available space. Step a4. Initialize the space obtained in the third step, set a corresponding data mechanism, and record relevant information of the small file system.
步骤a5、将要隐藏的文件通过相应的规则压缩加密后保存到相应的空间当中,记录文件相关信息。 In step a5, the file to be hidden is compressed and encrypted according to corresponding rules, and then stored in a corresponding space, and relevant information of the file is recorded.
用于隐藏数据恢复的数据读取方法具体包括如下步骤: The data reading method for hidden data recovery specifically includes the following steps:
步骤b1:遍历Windows操作系统下的磁盘分区表,找到每个分区的起始扇区号和结束扇区号,找到磁盘末尾扇区的扇区号。 Step b1: traverse the disk partition table under the Windows operating system, find the start sector number and end sector number of each partition, and find the sector number of the last sector of the disk.
步骤b2:根据第一步找到的分区信息,计算得到本小型文件系统的系统头部所在的扇区号。 Step b2: According to the partition information found in the first step, calculate the sector number where the system head of the small file system is located.
步骤b3:根据第二步中得到的本小型文件系统所在的扇区号,读取相关信息,获取空间中的文件的相关信息。 Step b3: According to the sector number of the small file system obtained in the second step, read the relevant information to obtain the relevant information of the files in the space.
步骤b4:根据第三步中得到的文件信息,对指定文件进行读取,解密解压缩后保存到操作系统当中。 Step b4: According to the file information obtained in the third step, read the specified file, decrypt and decompress it, and save it in the operating system.
更进一步地,所有的操作均是在应用层下完成,不涉及系统的内核操作。 Furthermore, all operations are completed under the application layer without involving the kernel operation of the system.
更进一步地,文件的隐藏是将原本属于Windows操作系统的文件独立于操作系统和系统分区,并将文件信息保存到其他地方,其文件中的数据还保存在硬盘当中。 Furthermore, the hiding of files is to separate the files originally belonging to the Windows operating system from the operating system and the system partition, and save the file information to other places, and the data in the files are also stored in the hard disk.
更进一步地,文件隐藏以及文件读取的核心都是对磁盘上面分区间隙和保留扇区的利用,在其中保存了本小型文件系统中的可利用空间的分布和保存的文件信息,可以从存储介质上直接读取数据。 Furthermore, the core of file hiding and file reading is the use of partition gaps and reserved sectors on the disk, in which the distribution of the available space in this small file system and the saved file information are stored, which can be stored from the storage Read data directly on the media.
更进一步地,操作系统被破坏或者重新安装以及分区重新格式化以后,只要没有进行重新分区,本小型文件系统中的相关信息不会被破坏,依旧保存在磁盘当中,通过客户端程序依旧可以完整的读取已经保存的文件。 Furthermore, after the operating system is destroyed or reinstalled and the partition is reformatted, as long as there is no repartitioning, the relevant information in this small file system will not be destroyed, and will still be stored in the disk, and can still be intact through the client program. to read saved files.
更进一步地,本专利隐藏文件的思想是在不破坏现有操作系统和文件系统的前提下,通过对磁盘分区间隙和保留扇区的利用达到隐藏文件的目的,隐藏和读取均通过专用的客户端来完成操作,以此达到文件隐藏目的的思想。 Furthermore, the idea of hiding files in this patent is to achieve the purpose of hiding files by using the disk partition gap and reserved sectors without destroying the existing operating system and file system. Both hiding and reading are through dedicated The client completes the operation, so as to achieve the idea of file hiding.
与现有技术相比,本方法具有如下优势: Compared with the prior art, this method has the following advantages:
隐藏文件操作和操作系统无关,即使重装系统或者格式化分区,只要没有对分区进行调整,则隐藏的文件不会被覆盖,可以最大限度的保证文件的完整性。 The hidden file operation has nothing to do with the operating system. Even if the system is reinstalled or the partition is formatted, as long as the partition is not adjusted, the hidden file will not be overwritten, which can ensure the integrity of the file to the greatest extent.
隐藏文件操作和文件系统无关,无论分区的文件格式是NTFS还是FAT32,都不会影响文件的隐藏。 The operation of hiding files has nothing to do with the file system, no matter whether the file format of the partition is NTFS or FAT32, it will not affect the hiding of files.
隐藏的文件和操作系统相对独立,除了使用专用的客户端程序,其他途径无法发现隐藏文件的存在,更无法获取压缩加密后的文件。极大的提高了隐藏文件的安全性。 Hidden files are relatively independent of the operating system. Except for using a dedicated client program, there is no other way to discover the existence of hidden files, let alone obtain compressed and encrypted files. Greatly improved the security of hidden files.
附图说明 Description of drawings
图1是文件隐藏流程图; Figure 1 is a flowchart of file hiding;
图2是文件读取流程图。 Figure 2 is a flow chart of file reading.
具体实施方式 Detailed ways
下面将结合附图及具体实施方式对本方法作进一步的描述。 The method will be further described below in conjunction with the accompanying drawings and specific embodiments.
本Windows下的应用层文件隐藏方法分为两个模块,数据隐藏模块以及数据读取模块。 The application layer file hiding method under Windows is divided into two modules, a data hiding module and a data reading module.
1.数据隐藏模块具体操作步骤为: 1. The specific operation steps of the data hiding module are as follows:
[1] :遍历Windows操作系统下的磁盘分区表,找到每个分区的起始扇区号和结束扇区号,通过磁盘总字节数计算得到磁盘末尾扇区(保留扇区扇)的扇区号。 [1]: Traverse the disk partition table under the Windows operating system, find the start sector number and end sector number of each partition, and calculate the sector number of the end sector (reserved sector sector) of the disk by calculating the total number of bytes on the disk.
[2] :根据第一步找到的分区信息和磁盘末尾扇区信息,计算每一个分区的结束位置到下一个分区的起始位置间的扇区信息,以及最后一个分区的结束位置到磁盘末尾的扇区信息,得到本方案可以利用的分区间隙和末尾可用扇区信息。 [2]: According to the partition information found in the first step and the sector information at the end of the disk, calculate the sector information from the end position of each partition to the start position of the next partition, and the sector information from the end position of the last partition to the end of the disk The sector information of the program can be used to obtain the partition gap and the available sector information at the end.
[3] :组织获取到的零散的可利用扇区,通过对其进行映射管理,形成一个逻辑上连续的完整可利用空间。 [3] : The fragmented available sectors obtained by the organization are mapped and managed to form a logically continuous and complete available space.
[4] :对第三步中获得的空间进行初始化,设置相应的数据机构,记录本方案设计的小型文件系统的可用空间,空闲空间,文件分布等相关信息。 [4]: Initialize the space obtained in the third step, set the corresponding data organization, and record the available space, free space, file distribution and other related information of the small file system designed in this scheme.
[5] :将要隐藏的文件通过压缩加密后按照倒序的顺序保存到对应的空闲空间当中,在文件系统头部记录文件名称,大小,位置等信息,同时修改可用扇区数量,文件数量等信息。 [5]: Compress and encrypt the files to be hidden in the corresponding free space in reverse order, record the file name, size, location and other information in the file system header, and modify the number of available sectors, number of files and other information at the same time .
2.数据读取方法的具体步骤为: 2. The specific steps of the data reading method are:
[1] :遍历Windows操作系统下的磁盘分区表,找到每个分区的起始扇区号和结束扇区号,通过磁盘总字节数计算得到磁盘末尾扇区的扇区号。 [1]: Traverse the disk partition table under the Windows operating system, find the start sector number and end sector number of each partition, and obtain the sector number of the end sector of the disk by calculating the total bytes of the disk.
[2] :根据第一步找到的分区信息,得到磁盘末尾扇区的扇区号,根据本方案设计的小型文件系统,磁盘末尾的扇区就是本方案设计的小型文件系统的系统头部所在的扇区。 [2]: According to the partition information found in the first step, the sector number of the sector at the end of the disk is obtained. According to the small file system designed in this scheme, the sector at the end of the disk is where the system head of the small file system designed in this scheme is located. sector.
[3] :根据第二步中得到的本小型文件系统所在的扇区号,读取文件系统相关信息,获取空间中的可用扇区,文件等相关信息。 [3]: According to the sector number of the small file system obtained in the second step, read the relevant information of the file system, and obtain the available sectors, files and other related information in the space.
[4] :根据第三步中得到的文件信息,对指定文件进行读取,然后通过解密解压缩后保存到操作系统当中。 [4] : According to the file information obtained in the third step, read the specified file, and then save it to the operating system after decompressing through decryption.
Claims (3)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410286953.9A CN104036201A (en) | 2014-06-25 | 2014-06-25 | Application-layer file hiding method on Windows operating system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201410286953.9A CN104036201A (en) | 2014-06-25 | 2014-06-25 | Application-layer file hiding method on Windows operating system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN104036201A true CN104036201A (en) | 2014-09-10 |
Family
ID=51466968
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201410286953.9A Pending CN104036201A (en) | 2014-06-25 | 2014-06-25 | Application-layer file hiding method on Windows operating system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN104036201A (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104408377A (en) * | 2014-10-29 | 2015-03-11 | 北京锐安科技有限公司 | Evidence data hidden storage method and device |
| CN104504345A (en) * | 2014-12-20 | 2015-04-08 | 无敌科技(西安)有限公司 | Device and method for hiding documents to be protected of card in universal documentation system |
| CN106909855A (en) * | 2017-03-24 | 2017-06-30 | 腾讯科技(深圳)有限公司 | File hiding method and device |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1506853A (en) * | 2002-12-09 | 2004-06-23 | 联想(北京)有限公司 | Method of utilizing hidden hard disc sector in protecting data under Windows system |
| CN103544443A (en) * | 2013-10-28 | 2014-01-29 | 电子科技大学 | Application layer file hiding method under NTFS file system |
-
2014
- 2014-06-25 CN CN201410286953.9A patent/CN104036201A/en active Pending
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1506853A (en) * | 2002-12-09 | 2004-06-23 | 联想(北京)有限公司 | Method of utilizing hidden hard disc sector in protecting data under Windows system |
| CN103544443A (en) * | 2013-10-28 | 2014-01-29 | 电子科技大学 | Application layer file hiding method under NTFS file system |
Non-Patent Citations (1)
| Title |
|---|
| 蔡风华: "基于FAT32文件系统的文件隐藏研究与实现", 《华中科技大学硕士学位论文》 * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104408377A (en) * | 2014-10-29 | 2015-03-11 | 北京锐安科技有限公司 | Evidence data hidden storage method and device |
| CN104504345A (en) * | 2014-12-20 | 2015-04-08 | 无敌科技(西安)有限公司 | Device and method for hiding documents to be protected of card in universal documentation system |
| CN106909855A (en) * | 2017-03-24 | 2017-06-30 | 腾讯科技(深圳)有限公司 | File hiding method and device |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Anderson et al. | Fast and secure laptop backups with encrypted de-duplication | |
| CN102171704B (en) | External encryption and recovery management with hardware encrypted storage devices | |
| CN103825953B (en) | A kind of user model encrypted file system | |
| US8285878B2 (en) | Block based access to a dispersed data storage network | |
| JP6568212B2 (en) | Hash-based multi-tenancy for deduplication systems | |
| CN101634992B (en) | Light-weight file encryption and decrypting and recovering method in NTFS file system | |
| US8560785B1 (en) | Techniques for providing multiple levels of security for a backup medium | |
| US11249672B2 (en) | Low-cost backup and edge caching using unused disk blocks | |
| US11995223B2 (en) | Data storage device encryption | |
| CN104252426A (en) | Multiple volume encryption of storage devices using self encrypting drive (sed) | |
| CN101286127A (en) | A continuous data protection and recovery method for multi-fork log storage | |
| US12058259B2 (en) | Data storage device encryption | |
| CN102930224A (en) | Hard drive data write/read method and device | |
| CN115268793A (en) | A data security deletion method based on data encryption and overwriting | |
| CN103544443B (en) | A kind of application layer file hiding method under new technology file system | |
| WO2021169121A1 (en) | Method for switching between data storage schemes, device, and storage medium | |
| US20120117384A1 (en) | Method and system for deleting data | |
| CN104036201A (en) | Application-layer file hiding method on Windows operating system | |
| CN102609371B (en) | System protecting method based on data security | |
| CN103488755B (en) | A kind of file system access method and apparatus | |
| CN102968597B (en) | Disk data connection chain-based file crushing method | |
| CN101908361A (en) | A U disk private information hiding method | |
| CN105335663A (en) | Encrypted file system based on double-image file | |
| CN103258170A (en) | Mobile storage medium data safety protective method | |
| Li et al. | TASecure: Temperature-aware secure deletion scheme for solid state drives |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB03 | Change of inventor or designer information |
Inventor after: Zhang Xiaosong Inventor after: Niu Weina Inventor after: Li Jie Inventor after: Wang Junfeng Inventor after: Wang Biao Inventor before: Zhang Xiaosong Inventor before: Xiang Qi Inventor before: Niu Weina Inventor before: Li Jie Inventor before: Chen Ruidong Inventor before: Wang Dong Inventor before: Li Jinshuan Inventor before: Ji Fengyu Inventor before: Xu Yunqing Inventor before: Bao Kai |
|
| CB03 | Change of inventor or designer information | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140910 |
|
| RJ01 | Rejection of invention patent application after publication |