Implementasi Sanitasi Data Pada Sistem Operasi Android dengan Metode Gutmann
Main Article Content
Abstract
Article Summary
Data security and privacy are essential for all mobile device users, especially Android. However, deleted data can generally still be recovered using forensic analysis of the storage media hardware with data recovery software. For this reason, you need a data deletion application capable of deleting safely. Many methods are available for safe deletion, such as applying different numbers of passes (overwriting). This research proves that most available methods cannot be deleted entirely and can be recovered, so a data deletion application was created using the most up-to-date method, the Gutmann Method. This method uses 35 number of operands to overwrite the file. Applications are made by analyzing system requirements and implementing them into mobile programming. Then, a comparison test is carried out with other existing applications. The results show that applications created using the Gutmann method are 33% less likely to find file traces than the best comparison application.
Keywords
Article Keywords
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC-BY 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
Haryati, S. (2012). Research and development (R&D) sebagai salah satu model penelitian dalam pendidikan. Majalah Ilmiah Dinamika, 37(1), 13.
Iman, N., Susanto, A., & Inggi, R. (2020). Analisa perkembangan digital forensik dalam penyelidikan cybercrime di Indonesia (Systematic Review). Jurnal Telekomunikasi dan Komputer, 9(3), 186. https://doi.org/10.22441/incomtech.v9i3.7210
Khalifa, H. R., Yulianto, F. A., & MJadied, E. (n.d.). Implementasi teknik penghapusan data dengan metode DoD 5220.22M pada sistem operasi Android.
Kurniawan, T. A. (2018). Pemodelan use case (UML): Evaluasi terhadap beberapa kesalahan dalam praktik. Jurnal Teknologi Informasi dan Ilmu Komputer, 5(1), 77–86. https://doi.org/10.25126/jtiik.201851610.
Kuswara, B. I. H., Pratama, A. R., & Ramadhani, E. (2022). Studi komparasi metode disk overwrite dan factory reset sebagai teknik anti forensik di perangkat Android. JATISI (Jurnal Teknik Informatika dan Sistem Informasi), 9(2), 1151–1161. https://doi.org/10.35957/jatisi.v9i2.1955
Marcellino, S., Seta, H. B., & Widi, I. W. (2023). Analisis forensik digital recovery data smartphone pada kasus penghapusan berkas menggunakan metode National Institute of Justice (NIJ). Informatik: Jurnal Ilmu Komputer, 19(2), 141–156. https://doi.org/10.52958/iftk.v19i2.4676
Mulazzani, M., Neuner, S., Kieseberg, P., Huber, M., Schrittwieser, S., & Weippl, E. (2013). Quantifying Windows file slack size and stability. IFIP Advances in Information and Communication Technology, 410, 183–193. https://doi.org/10.1007/978-3-642-41148-9_13
Nahar, N. F. A. M., Rahman, N. H. A., & Mohammad, K. M. (2018). E-raser: File shredder application with content replacement by using random words function. International Journal on Informatics Visualization, 2(4-2), 313–317. https://doi.org/10.30630/joiv.2.4-2.175
Permadi, A. B., Rizki, F., Sutiyo, A., & Saputra, M. R. E. (2023). Analisis efektivitas ingest module dalam mendeteksi dan memulihkan bukti digital yang disamarkan terenkripsi. Jurnal Forensik Digital, 1(1), 81–87.
Setiawan, N. A. (2017). Analisis perbandingan penghapusan data digital dengan menerapkan metode DoD 5220.22M dan metode Gutmann. Retrieved from http://repository.unpas.ac.id/id/eprint/31437
Sugiyono, P. D. (2019). Metode penelitian dan pengembangan (Research and Development/R&D) (4th ed.). Bandung: Alfabeta.