skip to main content
research-article

Forensic analysis of database tampering

Published: 12 December 2008 Publication History

Abstract

Regulations and societal expectations have recently expressed the need to mediate access to valuable databases, even by insiders. One approach is tamper detection via cryptographic hashing. This article shows how to determine when the tampering occurred, what data was tampered with, and perhaps, ultimately, who did the tampering, via forensic analysis. We present four successively more sophisticated forensic analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D algorithms, and characterize their “forensic cost” under worst-case, best-case, and average-case assumptions on the distribution of corruption sites. A lower bound on forensic cost is derived, with RGBY and a3D being shown optimal for a large number of corruptions. We also provide validated cost formulæ for these algorithms and recommendations for the circumstances in which each algorithm is indicated.

Supplementary Material

Pavlou Appendix (a30-pavlou-apndx.pdf)
Online appendix to forensic analysis of database tampering. The appendix supports the information on article 30.

References

[1]
Agrawal, R., Grandison, T., Johnson, C., and Kiernan, J. 2007. Enabling the 21st century healthcare IT revolution. Comm. ACM, 50, 2, 34--42.
[2]
Ahn, I. and Snodgrass, R. T. 1988. Partitioned storage structures for temporal databases. Inform. Syst., 13, 4, 369--391.
[3]
Bair, J., Böhlen, M., Jensen, C. S., and Snodgrass, R. T. 1997. Notions of upward compatibility of temporal query languages. Bus. Inform. 39, 1, 25--34.
[4]
Barbará, D., Goel, R., and Jajodia, S. Using checksums to detect data corruption. In Proceedings of the International Conference on Extending Database Technology, Lecture Notes in Computer Science, vol. 1777, Springer, Berlin, Germany.
[5]
Carvey, H. and Kleiman, D. 2007. Windows Forensics and Incident Recovery, Syngres.
[6]
Chan, C. C., Lam, H., Lee, Y. C., and Zhang, X. 2004. Analytical Method Validation and Instrument Performance Verification, Wiley-IEEE.
[7]
CSI/FBI. 2005. Tenth Annual Computer Crime and Security Survey, http://www.cpppe.umd.edu/Bookstore/Documents/2005CSISurvey.pdf (accessed April 25, 2008).
[8]
Department of Defense. 1985. Trusted Computer System Evaluation Criteria. DOD-5200.28-STD, http://www.dynamoo.com/orange (accessed April 25, 2008).
[9]
F.D.A. 2003. Title 21 Code of Federal Regulations (21 CFR Part 11) Electronic records; Electronic Signatures, http://www.fda.gov/ora/compliance_ref/part11/(accessed April 28, 2008).
[10]
Fu, K., Kaashoek, M. F., and Mazières, D. 2000. Fast and secure distributed read-only file system. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). USENIX Association, Berkeley, CA, 181--196.
[11]
Gerr, P. A., Babineau, B., and Gordon, P. C. 2003. Compliance: The effect on information management and the storage industry. Tech. rep. Enterprise Storage Group. http://www. enterprisestrategygroup.com/ESGPublications/ReportDetail.asp?ReportID=201 (accessed May 4, 2008).
[12]
Goodrich, M. T., Atallah, M. J., and Tamassia, R. 2005. Indexing information for data forensics. In Proceedings of the Conference on Applied Cryptography and Network Security (ACNS). Lecture Notes in Computer Science, vol. 3531, Springer, Berlin, Germany, 206--221.
[13]
Graham, R. L., Knuth, D. E., and Patashnik, O. 2004. Concrete Mathematics, 2nd Ed., Addison--Wesley.
[14]
Haber, S. and Stornetta, W. S. 1991. How to time-stamp a digital document. J. Cryptology, 3, 2, 99--111.
[15]
HIPAA. 1996. The Health Insurance Portability and Accountability Act. U.S. Dept. of Health & Human Services. http://www.cms.hhs.gov/HIPAAGenInfo/(accessed April 25, 2008).
[16]
Hsu, W. W. and Ong, S. 2004. Fossilization: a process for establishing truly trustworthy records. Tech. rep. RJ 10331, IBM.
[17]
Jensen, C. S. and Dyreson, C. E., Eds. 1998. A consensus glossary of temporal database concepts—(February 1998 Version). In Temporal Databases: Research and Practice, Etzion, O., Jajodia, S., and Sripada S., Eds. Springer, 367--405.
[18]
Jensen, C. S. and Snodgrass, R. T. 1994. Temporal specialization and generalization. IEEE Trans. Knowl. Data Eng. 6, 6, 954--974.
[19]
Johnston, R. G. Tamper-indicating seals. 2006. Am. Sci. 94, 6, 515--524.
[20]
Lomet, D., Barga, R., Mokbel, M. F., Shegalov, G., Wang, R., and Zhu, Y. 2005. Immortal DB: transaction time support for SQL server. In Proceedings of the International ACM Conference on Management of Data (SIGMOD), ACM, New York, 939--941. http://research.microsoft.com/research/db/immortaldb/ (accessed April 25, 2008).
[21]
Mazières, D., Kaminsky, M., Kaashoek, M. F., and Witchel, E. 1999. Separating key management from file system security. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP). ACM, New York, NY, 124--139.
[22]
Mena, J. 2003. Investigative Data Mining for Security and Criminal Detection. Butterworth Heinemann.
[23]
Muthitacharoen, A., Morris, R., Gil, T. M., and Chen, B. 2002. Ivy: A read/write peer-to-peer file system. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation (SOSDI). ACM, New York, NY, 31--44.
[24]
Oracle Corporation. 2007. Oracle Database 11g Workspace Manager Overview. Oracle White Paper, http://www.oracle.com/technology/products/database/workspace_manager/pdf/twp_AppDev_Workspace_Manager_11gR1.pdf (accessed April 28, 2008).
[25]
Pavlou, K. E. and Snodgrass, R. T. 2006a. Forensic analysis of database tampering. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). ACM, New York, NY, 109--120.
[26]
Pavlou, K. E. and Snodgrass, R. T. 2006b. The pre-images of bitwise AND functions in forensic analysis. Tech. rep., TimeCenter.
[27]
PIPEDA. 2000. Personal Information Protection and Electronic Documents Act. Bill C-6, Statutes of Canada, http://www.privcom.gc.ca/legislation/02_06_01_01_e.asp.
[28]
Sarbanes-Oxley Act. 2002. U.S. Public Law No. 107--204, 116 Stat. 745, The Public Company Accounting Reform and Investor Protection Act.
[29]
Schneier, B. and Kelsey, J. 1999. Secure audit logs to support computer forensics. ACM Trans. Inform. Syst. Sec. 2, 2, 159--196.
[30]
Snodgrass, R. T., Yao, S. S., and Collberg, C. 2004. Tamper detection in audit logs. In Proceedings of the International Conference on Very Large Databases (VLDB). Toronto, Canada. Morgan Kaufmann, San Francisco, CA, 504--515.
[31]
Stahlberg, P., Miklau, G., and Levine, B. N. 2007. Threats to privacy in the forensic analysis of database systems. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). Beijing, China. ACM, New York, NY, 91--102.
[32]
Wingate, G., Ed. 2003. Computer Systems Validation: Quality Assurance, Risk Management, and Regulatory Compliance for Pharmaceutical and Healthcare Companies. Informa Healthcare.
[33]
Zhu, Q. and Hsu, W. W. 2005. Fossilized index: The linchpin of trustworthy non-alterable electronic records. In Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD). Baltimore, Md. ACM, New York, NY, 395--406.

Cited By

View all
  • (2024)A Forensic Framework for gathering and analyzing Database Systems using Blockchain TechnologyEngineering, Technology & Applied Science Research10.48084/etasr.714314:3(14079-14087)Online publication date: 1-Jun-2024
  • (2024)Digital Forensics Readiness Framework (DFRF) to Secure Database SystemsEngineering, Technology & Applied Science Research10.48084/etasr.711614:2(13732-13740)Online publication date: 2-Apr-2024
  • (2024)Smart proctoring with automated anomaly detectionEducation and Information Technologies10.1007/s10639-024-13189-7Online publication date: 2-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Database Systems
ACM Transactions on Database Systems  Volume 33, Issue 4
November 2008
379 pages
ISSN:0362-5915
EISSN:1557-4644
DOI:10.1145/1412331
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 December 2008
Accepted: 01 August 2008
Revised: 01 June 2008
Received: 01 December 2007
Published in TODS Volume 33, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Monochromatic algorithm
  2. Polychromatic algorithm
  3. RGBY algorithm
  4. Tiled Bitmap algorithm
  5. a3D algorithm
  6. compliant records
  7. forensic analysis algorithm
  8. forensic cost

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)34
  • Downloads (Last 6 weeks)4
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A Forensic Framework for gathering and analyzing Database Systems using Blockchain TechnologyEngineering, Technology & Applied Science Research10.48084/etasr.714314:3(14079-14087)Online publication date: 1-Jun-2024
  • (2024)Digital Forensics Readiness Framework (DFRF) to Secure Database SystemsEngineering, Technology & Applied Science Research10.48084/etasr.711614:2(13732-13740)Online publication date: 2-Apr-2024
  • (2024)Smart proctoring with automated anomaly detectionEducation and Information Technologies10.1007/s10639-024-13189-7Online publication date: 2-Dec-2024
  • (2023)Electronic Evidence: A Framework for Applying Digital Forensics to Data BaseJournal of Forensic Accounting Research10.2308/JFAR-2022-0068:1(266-286)Online publication date: 20-Nov-2023
  • (2023)Factors Influencing the Success of Database Forensic Investigation in Organisations2023 International Conference on Electrical, Computer and Energy Technologies (ICECET)10.1109/ICECET58911.2023.10389518(1-7)Online publication date: 16-Nov-2023
  • (2023)Multi-State Merkle Patricia Trie (MSMPT): High-Performance Data Structures for Multi-Query Processing Based on Lightweight BlockchainIEEE Access10.1109/ACCESS.2023.332574811(117282-117296)Online publication date: 2023
  • (2023)Database memory forensics: Identifying cache patterns for log verificationForensic Science International: Digital Investigation10.1016/j.fsidi.2023.30156745(301567)Online publication date: Jul-2023
  • (2022)Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future DirectionsIEEE Access10.1109/ACCESS.2022.321450610(110362-110384)Online publication date: 2022
  • (2021)Face Validation of Database Forensic Investigation MetamodelInfrastructures10.3390/infrastructures60200136:2(13)Online publication date: 20-Jan-2021
  • (2021)Query Processing in Blockchain Systems: Current State and Future ChallengesFuture Internet10.3390/fi1401000114:1(1)Online publication date: 21-Dec-2021
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media