Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2014.050406
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 5 Issue 4, 2014.
Abstract: To improve the user's experience, almost all applications save usage data: web browsers save history and cookies, chat programs save message archives and so on. However, this data can be confidential and may compromise the user's privacy. There are third party solutions to automatically detect and wipe these traces, but they have two problems: they need a constantly updated database of files to target, and they wipe the data after it has been written to the disk. Our proposed solution does not need a database and it automatically reverts the application to its initial (clean) state, leaving no traces behind. This is done by using a monitoring process developed by us and the Volume Shadow Copy Service that takes snapshots when the application runs and restores them at the end of the run.
George Pecherle, Cornelia Gyorödi and Robert Gyorödi, “Methods of Isolation for Application Traces Using Virtual Machines and Shadow Copies” International Journal of Advanced Computer Science and Applications(IJACSA), 5(4), 2014. http://dx.doi.org/10.14569/IJACSA.2014.050406