Abstract

The set of policies and the group of people need to access the valuable database by the authorized inter mediator, still the organizational employee also go through the authorized inter mediator. Cryptographic hashing is one of the best approach and work as a inter mediator. This paper show how to resolve when tampering arises in Database, what data was tampered and the identification of the person to tamper the data. These things are detected by using the forensic analysis. This paper presents a new forensic analysis algorithm, the tiled bitmap algorithm, which is more capable then the previous algorithm. It introduces the concept of a candidate set (all possible place of detected tampering(s)) and gives a full classification of the candidate set and its cardinality and prevent the intruder, the computing of the candidate set is also presented. There are certain cases happened in BANK and other sector where the data has been tamper by the assessor, outsider or by the employees of the organizations. The separate audit logs validate to observe and inspect the database along with the extra information and state of the data. Audit log play a central role in database. The space and time complexity is less in this forensic analysis algorithm.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.