Methods of Isolation for Application Traces Using Virtual Machines and Shadow Copies

Abstract

To improve the user's experience, almost all applications save usage data: web browsers save history and cookies, chat programs save message archives and so on. However, this data can be confidential and may compromise the user's privacy. There are third party solutions to automatically detect and wipe these traces, but they have two problems: they need a constantly updated database of files to target, and they wipe the data after it has been written to the disk. Our proposed solution does not need a database and it automatically reverts the application to its initial (clean) state, leaving no traces behind. This is done by using a monitoring process developed by us and the Volume Shadow Copy Service that takes snapshots when the application runs and restores them at the end of the run.

Authors and Affiliations

George Pecherle, Cornelia Gyorödi, Robert Gyorödi

Keywords

Related Articles

Qualitative Study of Existing Research Techniques on Wireless Mesh Network

Wireless Mesh Network (WMN) is one of the significant forms of the wireless mesh network that assists in creating highly interconnected communication node. Since a decade, there have been various studies towards enhancin...

A New Parallel Matrix Multiplication Algorithm on Tree-Hypercube Network using Iman1 Supercomputer

The tree-hypercube (TH) interconnection network is relatively a new interconnection network, which is constructed from tree and hypercube topologies. TH is developed to support parallel algorithms for solving computation...

Measuring the Data Openness for the Open Data in Saudi Arabia e-Government – A Case Study

Conceptually, data can be found at the lowest level of abstraction from where information and knowledge are being extracted. Furthermore, data itself has no meaning, unless it’s being interpreted and transferred into inf...

Machine-Learning Techniques for Customer Retention: A Comparative Study

Nowadays, customers have become more interested in the quality of service (QoS) that organizations can provide them. Services provided by different vendors are not highly distinguished which increases competition between...

Modified Random Forest Approach for Resource Allocation in 5G Network

According to annual visual network index (VNI) report by the year 2020, 4G will reach its maturity and incremental approach will not meet demand. Only way is to switch to newer generation of mobile technology called as 5...

Download PDF file
  • EP ID EP131549
  • DOI 10.14569/IJACSA.2014.050406
  • Views 115
  • Downloads 0

How To Cite

George Pecherle, Cornelia Gyorödi, Robert Gyorödi (2014). Methods of Isolation for Application Traces Using Virtual Machines and Shadow Copies. International Journal of Advanced Computer Science & Applications, 5(4), 33-37. https://europub.co.uk/articles/-A-131549