Preview

Bulletin of Shakarim University. Technical Sciences

Advanced search

ANALYSIS OF METHODS FOR ENCRYPTING VIDEO RECORDER FILE SYSTEMS TO OPTIMIZE DIGITAL FORENSICS RESEARCH METHODS

https://doi.org/10.53360/2788-7995-2025-2(18)-13

Abstract

Mobile phones have become not only a means of communication, but also significant sources of information. Despite the development of encryption technologies and methods, it remains important to develop special and obtain new knowledge, search, develop and improve methods and approaches to the study of mobile devices. This study solves problems aimed at solving problems of optimizing the data analysis and processing system, as well as effective decision-making during the investigation of digital forensic experts based on artificial intelligence technologies and machine learning algorithms. In view of this, as well as in order to create new methods and algorithms, a deep and comprehensive analysis and review of the encryption methods of video recorder file systems for optimizing digital forensics research methods was carried out. The analysis and review of the video recorder file system made it possible to justify the choice and development of a methodology for detecting encryption and restoring video data from digital video recorders and mobile devices. The review defines the structure and mechanism of the file system. The conducted analysis and review are useful for forensic experts and digital forensics experts in analyzing digital evidence related to video surveillance. This analysis and review were the first stage in the implementation of a scientific project on digital forensics.

About the Authors

L. Rzayeva
Astana IT University

Leila Rzayeva – PhD, Associate Professor,

010000, Astana, Mangilik El Avenue, 55/11



G. Abitova
Astana IT University
Kazakhstan

Gulnara Abitova – PhD, Associate Professor,

010000, Astana, Mangilik El Avenue, 55/11



K. Niyazaliyev
Astana IT University

Kyandyk Niazaliyev – MSc., Researcher,

010000, Astana, Mangilik El Avenue, 55/11



A. Baitulakov
Astana IT University

Anuar Baitulakov – MSc., Senior-Lecturer,

010000, Astana, Mangilik El Avenue, 55/11



V. Nikulin
State University of New York
United States

Vladimir Nikulin - PhD, Associate Professor, 

4400 Vestal Pkwy E, Binghamton, NY 13902



References

1. Dahua Technology. Dahua Product Security White Paper. Dahua Technology. URL: https://material.dahuasecurity.com/uploads/soft/20240531/Dahua-Product-Security-White-PaperV3.0.pdf (date of access: 24.11.2024).

2. Dahua Technology. Dahua Product Security White Paper. Dahua Technology. URL: https://material.dahuasecurity.com/uploads/soft/20240531/Dahua-Product-Security-White-PaperV3.0.pdf (date of access: 24.11.2024). – С. 24.

3. Hangzhou Hikvision Digital Technology Co., Ltd. NVR Security Guide. Hikvision. URL: https://www.hikvision.com/content/dam/hikvision/en/cybersecurity/NVR%20Security%20Guide.pdf (date of access: 24.11.2024).

4. Hangzhou Hikvision Digital Technology Co., Ltd. Network Camera Firmware Version: V5.6.10 Release Note. Hikvision. URL: https://www.hikvisioneurope.com/eu//portal/portal/Technical%20Materials/00%20%20Network%20Camera/00%20%20Product%20Firmware/H3%20platform (5xxx,7xxx,6924,6DX4,8426)/DS-2CD7XXX/V5.6.10_Build190919(Released)/IPC%20H3%20V5.6.10%20Release%20Note--External.pdf (date of access: 24.11.2024)], [Hangzhou Hikvision Digital Technology Co., Ltd. UD21022B-E Network Camera User Manual. Hikvision. URL: https://www.hikvision.com/content/dam/hikvision/products/S000000001/S000000002/S000000016/S000000027/OFR000044/M000051183/User_Manual/UD21022B-E_Network-Camera_UserManual_5.5.111_20240204.pdf (date of access: 24.11.2024), С. 38.

5. Hangzhou Hikvision Digital Technology Co., Ltd. What encryption standard does Hikvision use for SD cards? Hikvision. URL: https://supportusa.hikvision.com/support/solutions/articles/17000129431-what-encryption-standard-does-hikvision-use-for-sd-cards- (date of access: 24.11.2024).

6. Hangzhou Hikvision Digital Technology Co., Ltd. HDD Compatible List for Hikvision DVR/NVR. Hikvision. URL: https://www.hikvision.com/content/dam/hikvision/en/support/notice/HDDCompatible-List-for-Hikvision-DVR-NVR_20240315.pdf (date of access: 24.11.2024), с. 7.

7. Hangzhou Hikvision Digital Technology Co., Ltd. Enabling/Disabling Video and Image Encryption. User Authentication Center. URL: https://www.hik-connect.com/views/terms/helpAndroid/Hik%20Enabling%20or%20Disabling%20Video%20and%20Image%20Encryption.html (date of access: 24.11.2024).

8. SpyCameraCCTV. Hikvision IVMS-4200 – Stream is Encrypted. SpyCameraCCTV Helpdesk. URL: https://gethelp.spycameracctv.com/en-US/hikvision-ivms-4200---stream-is-encrypted-277209 (date of access: 24.11.2024).

9. Hangzhou Hikvision Digital Technology Co., Ltd. Hikvision Cloud-Based Platform Security White Paper. Hikvision. URL: https://pinfo.hikvision.com/hkwsen/unzip/20241029114559_91608_doc/Hikvision%20Cloud-Based%20Platform%20Security%20White%20Paper_20241027.pdf (date of access: 24.11.2024).

10. Android Open-Source Project. Trusty TEE | Android Open-Source Project . Electronic resource. URL: https://source.android.com/docs/security/features/trusty (date of access: 25.11.2024).

11. Android Open-Source Project. Support Direct Boot mode | Security | Android Developers . Electronic resources. URL: https://developer.android.com/privacy-and-security/direct-boot (accessed: 25.11.2024).

12. Android Open-Source Project. File-based encryption | Android Open-Source Project . Electronic resource. URL: https://source.android.com/docs/security/features/encryption/file-based (accessed: 25.11.2024).

13. Zebra Developer Portal. Android™ 13 Security Overview: Direct Boot, FBE and more... . Electronic resources. URL: https://developer.zebra.com/blog/androidtm-13-security-overviewdirect-boot-fbe-and-more (date of access: 25.11.2024).

14. NIST. Recommendation for Block Cipher Modes of Operation: the XTS-AES Mode for Confidentiality on Storage Devices. NIST SP 800-38E. Gaithersburg: NIST, 2010. 12 p. Electronic resources. URL: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-38e.pdf (accessed: 25.11.2024).

15. Crowley P. Adiantum: length-preserving encryption for entry-level processors / P. Crowley, E. Biggers // IACR Transactions on Symmetric Cryptology. – 2018. – Р. 39-61. Electronic resources . https://doi.org/10.46586/tosc.v2018.i4.39-61 (date accesses : 11/25/2024).

16. Apple Support. Secure Enclave . Electronic resources . URL: https://support.apple.com/ruru/guide/security/sec59b0b31ff/web (accessed: 25.11.2024).

17. Hackaday. Apple's Secure Enclave Processor (SEP) Firmware Decrypted . Electronic resource. URL: https://hackaday.com/2017/08/18/apples-secure-enclave-processor-sep-firmware-decyrpted/ (date of access: 25.11.2024).

18. Apple Developer Documentation. Keychain services . Electronic resources. URL: https://developer.apple.com/documentation/security/keychain-services (accessed: 25.11.2024).

19. CSE. URL: http://www.cseweb.ucsd.edu/classes/fa10/cse120/lectures/CSE120-lecture.pdf

20. Apple developer's documentation. URL: https://developer.apple.com/library/ios/documentation /Miscellaneous/Conceptual/iphoneostechoverview/iOSTechOverview.pdf

21. Cambridge, development. URL: www.cl.cam.ac.uk/~acr31/p36/WP8%20Development%20Cambridge.pdf

22. ITU, Nokia and Symbian. URL: http://itu.dk/courses/ISOM/E2005/Nokia_and_Symbian_OS% 5B1%5D.pdf

23. Gul M. A survey of anti-forensics techniques. 2017 International Artificial Intelligence and Data Processing Symposium (IDAP) / M. Gul, E. Kugu // Malatya. – 2017. – Р. 1-6. Google Scholar.

24. Van Belle J.-P. A. Stander Anti-forensics: a practitioner perspective / J.-P. Van Belle, R. De Beer //Int. J. Cyber-Security. Digit. Forensics. – 2014. – № 4(2). – Р. 391. Google Scholar.


Review

For citations:


Rzayeva L., Abitova G., Niyazaliyev K., Baitulakov A., Nikulin V. ANALYSIS OF METHODS FOR ENCRYPTING VIDEO RECORDER FILE SYSTEMS TO OPTIMIZE DIGITAL FORENSICS RESEARCH METHODS. Bulletin of Shakarim University. Technical Sciences. 2025;(2(18)):109-120. https://doi.org/10.53360/2788-7995-2025-2(18)-13

Views: 5


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2788-7995 (Print)
ISSN 3006-0524 (Online)
X