Data Hiding Techniques for Database Environments
Databases are widely used today, but the study of forensic analysis in database environments has not been extensive. The lack of research is due mostly to the complex structure of databases and the scarcity of database forensic tools. This has created a wide range of possibilities for data hiding as a means to hinder data discovery during forensic investigations. This paper describes several techniques that can be used to hide data in a database. Although the techniques are evaluated with respect to object-relational databases, they can be applied to any type of database.
KeywordsDatabase forensics data hiding
- 3.T. Connolly and C. Begg, Database Systems: A Practical Approach to Design, Implementation and Management, Addison Wesley Longman, London, United Kingdom, 2009.Google Scholar
- 4.K. Fowler, SQL Server database forensics, presented at the Black Hat USA Conference, 2007. Google Scholar
- 6.M. Guimaraes, R. Austin and H. Said, Database forensics, Proceedings of the Information Security Curriculum Development Conference, pp. 62-65, 2010.Google Scholar
- 8.PostgreSQL Global Development Group, PostgreSQL 8.4.12 Documentation, San Francisco, California (www.postgresql.org/docs/8.4/interactive/index.html), 2009.
- 9.P. Rob and C. Coronel, Database Systems: Design, Implementation and Management, Thomson Course Technology, Boston, Massachusetts, 2009.Google Scholar
- 10.P. Stahlberg, G. Miklau and B. Levine, Threats to privacy in the forensic analysis of database systems, Proceedings of the ACM International Conference on Management of Data, pp. 91–102, 2007.Google Scholar
- 11.N. Wu and M. Hwang, Data hiding: Current status and key issues, International Journal of Network Security, vol. 4(1), pp. 1–9, 2007.Google Scholar
- 12.A. Yeung and G. Hall, Spatial Database Systems: Design, Implementation and Project Management, Springer, Dordrecht, The Netherlands, 2007. Google Scholar