The set of policies and the group of people need to access the valuable database by the authorized inter mediator, still the organizational employee also go through the authorized inter mediator. Cryptographic hashing is one of the best approach and work as a inter mediator. This paper show how to resolve when tampering arises in Database, what data was tampered and the identification of the person to tamper the data. These things are detected by using the forensic analysis. This paper presents a new forensic analysis algorithm, the tiled bitmap algorithm, which is more capable then the previous algorithm. It introduces the concept of a candidate set (all possible place of detected tampering(s)) and gives a full classification of the candidate set and its cardinality and prevent the intruder, the computing of the candidate set is also presented.There are certain cases happened in BANK and other sector where the data has been tamper by the assessor, outsider or by the employees of the organizations. The separate audit logs validate to observe and inspect the database along with the extra information and state of the data. Audit log play a central role in database. The space and time complexity is less in this forensic analysis algorithm.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.