National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) |
Foundation of Computer Science USA |
NCKITE2015 - Number 3 |
July 2015 |
Authors: Manish H. Bhagwani, Rajiv V. Dharaskar, V. M. Thakare |
b459769d-e2a1-480a-891c-f3ed00270c3a |
Manish H. Bhagwani, Rajiv V. Dharaskar, V. M. Thakare . Comparative Analysis of Database Forensic Algorithms. National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015). NCKITE2015, 3 (July 2015), 33-36.
Security is major concern in data outsourcing environment, since data is under the custody of third party service provider in many cases. In present systems, third partycan access & view data even though they are not authorized todo so or even when the data is outsourced to the auditors orallow the employee of the organization to do the updating in the database. This may lead to the serious data theft, data tampering & even data leakages causing severe business impact to data owner. Digital Forensic analysis of databases helps to solve the problem. In this paper various database tamper detection algorithms are studied and compared based on space and time complexities.