2014
DOI: 10.1016/j.diin.2014.09.003
|View full text |Cite
|
Sign up to set email alerts
|

Towards a forensic-aware database solution: Using a secured database replication protocol and transaction management for digital investigations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 27 publications
(24 citation statements)
references
References 20 publications
0
24
0
Order By: Relevance
“…The term “chained witnesses” was coined in [18], where the authors propose a technique for securing internal mechanisms of databases against manipulation. The main advantage of this approach over the multitude of approaches described in the literature was resilience against an attacker model that included the database administrator as possible adversary.…”
Section: Background and Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…The term “chained witnesses” was coined in [18], where the authors propose a technique for securing internal mechanisms of databases against manipulation. The main advantage of this approach over the multitude of approaches described in the literature was resilience against an attacker model that included the database administrator as possible adversary.…”
Section: Background and Related Workmentioning
confidence: 99%
“…For the verification, the data of the protected internal logging mechanisms are executed against an old trusted backup under the premise of and compared to the investigated database instance. This also works, when reverting the whole database to an old state: The PRNG is seeded with a seed unknown to the attacker, every iteration changes the state of the PRNG, which cannot be calculated backwards (this is ensured by the criteria for the hash function and the PRNG in [18]). Thus, in the case of reverting, the states of the missing entries can be detected easily.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Previous research [2][3][4] has shown that physically-deleted records can be recovered by directly reading the filesystem. Several additional observations can be made based on the index and the actual algorithm that is used:…”
Section: Forensic Impactmentioning
confidence: 99%