Abstract
Databases are widely used today, but the study of forensic analysis in database environments has not been extensive. The lack of research is due mostly to the complex structure of databases and the scarcity of database forensic tools. This has created a wide range of possibilities for data hiding as a means to hinder data discovery during forensic investigations. This paper describes several techniques that can be used to hide data in a database. Although the techniques are evaluated with respect to object-relational databases, they can be applied to any type of database.
Chapter PDF
Similar content being viewed by others
Keywords
References
W. Bender, D. Gruhl, N. Morimoto and A. Lu, Techniques for data hiding, IBM Systems Journal, vol. 35(3-4), pp. 313–336, 1996.
H. Berghel, Hiding data, forensics and anti-forensics, Communications of the ACM, vol. 50(4), pp. 15–20, 2007.
T. Connolly and C. Begg, Database Systems: A Practical Approach to Design, Implementation and Management, Addison Wesley Longman, London, United Kingdom, 2009.
K. Fowler, SQL Server database forensics, presented at the Black Hat USA Conference, 2007.
P. Fruhwirt, M. Huber, M. Mulazzani and E. Weippl, InnoDb database forensics, Proceedings of the Twenty-Fourth IEEE International Conference on Advanced Information Networking and Applications, pp. 1028–1036, 2010.
M. Guimaraes, R. Austin and H. Said, Database forensics, Proceedings of the Information Security Curriculum Development Conference, pp. 62-65, 2010.
M. Olivier, On metadata context in database forensics, Digital Investigation, vol. 5(3-4), pp. 115–123, 2009.
PostgreSQL Global Development Group, PostgreSQL 8.4.12 Documentation, San Francisco, California ( www.postgresql.org/docs/8.4/interactive/index.html ), 2009.
P. Rob and C. Coronel, Database Systems: Design, Implementation and Management, Thomson Course Technology, Boston, Massachusetts, 2009.
P. Stahlberg, G. Miklau and B. Levine, Threats to privacy in the forensic analysis of database systems, Proceedings of the ACM International Conference on Management of Data, pp. 91–102, 2007.
N. Wu and M. Hwang, Data hiding: Current status and key issues, International Journal of Network Security, vol. 4(1), pp. 1–9, 2007.
A. Yeung and G. Hall, Spatial Database Systems: Design, Implementation and Project Management, Springer, Dordrecht, The Netherlands, 2007.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Pieterse, H., Olivier, M. (2012). Data Hiding Techniques for Database Environments. In: Peterson, G., Shenoi, S. (eds) Advances in Digital Forensics VIII. DigitalForensics 2012. IFIP Advances in Information and Communication Technology, vol 383. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33962-2_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-33962-2_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33961-5
Online ISBN: 978-3-642-33962-2
eBook Packages: Computer ScienceComputer Science (R0)