Implementing chain of custody requirements in database audit records for forensic purposes


Abstract:

During forensic database investigations, audit records become a crucial evidential element; particularly, when certain events can be attributed to insider activity. However, traditional reactive forensic methods may not be suitable, urging the adoption of proactive approaches that can be used to ensure accountability through audit records whilst satisfying Chain of Custody (CoC) requirements for forensic purposes. In this paper, role segregation, evidence provenance, event timeliness and causality are considered as CoC requirements in order to implement a forensically ready architecture for the proactive generation, collection and preservation of database audit records that can be used as digital evidence for the investigation of insider activity. Our proposal implements triggers and stored procedures as forensic routines in order to build a vector-clock-based timeline for explaining causality in transactional events recorded in audit tables. We expect to encourage further work in the field of proactive digital forensics and forensic readiness; in particular, for justifying admissibility of audit records under CoC restrictions.

Año de publicación:

2017

Keywords:

  • Proactive
  • Timeline
  • Admissibility
  • Role segregation
  • Chain of custody
  • Architecture
  • Database forensics
  • Audit
  • Vector clock
  • Trigger
  • Provenance
  • Stored procedure
  • causality

Fuente:

scopusscopus
googlegoogle

Tipo de documento:

Conference Object

Estado:

Acceso restringido

Áreas de conocimiento:

  • Base de datos
  • Base de datos

Áreas temáticas:

  • Funcionamiento de bibliotecas y archivos