Principles of Designing and Implementing System of Automated File Deletion and Control for Windows Os

2024;
: pp. 171-178
1
Lviv Polytechnic National University, Department of Electronic Computers
2
Lviv Polytechnic National University
3
Lviv Polytechnic National University, Computer Engineering Department

The article examines the file system at the kernel level of the operating system. It addresses the primary issues related to personal data loss and protection and the general challenges of filtering content stored on users' computers.

The analysis reveals that increasing personal data is being lost or leaked from personal computers without users' knowledge. It also shows that many files stored on users' computers are potentially dangerous or unnecessary. The article emphasizes the development of an effective software solution to tackle the issue of filtering content on users' personal computers using a file system filter.

The article's objective is to outline the key aspects of the study and the steps involved in creating a software system that automatically removes unwanted content and protects important user data from being lost. Specifically, the system allows creating rules for filtering user data. Additionally, it enables system administrators to review processed system performance statistics for individual users. It displays information about both deleted files and files that have been backed up to a virtual encrypted disk.

  1. Tripathi, Manas, and Arunabha Mukhopadhyay. 2020. “Financial Loss Due to a Data Privacy Breach: An Empirical Analysis .” Journal of Organizational Computing and Electronic Commerce 30 (4): 381–400. doi:10.1080/10919392.2020.1818521.
  2. A. Buda and A. Coleşa, "File System Minifilter Based Data Leakage Prevention System," 2018 17th RoEduNet Conference: Networking in Education and Research (RoEduNet), Cluj-Napoca, Romania, 2018, pp. 1-6, doi: 10.1109/ROEDUNET.2018.8514147.
  3. R. Colbaugh and K. Glass, "Proactive defense for evolving cyber threats," Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, Beijing, China, 2011, pp. 125-130, doi: 10.1109/ISI.2011.5984062.
  4. S. R. Subramanya and B. K. Yi, "Digital signatures," in IEEE Potentials, vol. 25, no. 2, pp. 5-8, March-April 2006, doi: 10.1109/MP.2006.1649003.
  5. F. Huo and G. Gong, "XOR Encryption Versus Phase Encryption, an In-Depth Analysis," in IEEE Transactions on Electromagnetic Compatibility, vol. 57, no. 4, pp. 903-911, Aug. 2015, doi: 10.1109/TEMC.2015.2390229.
  6. D. A. Solomon, "The Windows NT kernel architecture," in Computer, vol. 31, no. 10, pp. 40-47, Oct. 1998, doi: 10.1109/2.722284