NoSQL databases : forensic attribution implications

dc.contributor.authorHauger, W.K. (Werner)
dc.contributor.authorOlivier, Martin S.
dc.contributor.emailmolivier@cs.up.ac.zaen_ZA
dc.date.accessioned2019-03-04T10:08:06Z
dc.date.available2019-03-04T10:08:06Z
dc.date.issued2018-06
dc.description.abstractNoSQL databases have gained a lot of popularity over the last few years. They are now used in many new system implementations that work with vast amounts of data. Such data will typically also include sensitive information that needs to be secured. NoSQL databases are also underlying a number of cloud implementations which are increasingly being used to store sensitive information by various organisations. This has made NoSQL databases a new target for hackers and other state sponsored actors. Forensic examinations of compromised systems will need to be conducted to determine what exactly transpired and who was responsible. This paper examines specifically if NoSQL databases have security features that leave relevant traces so that accurate forensic attribution can be conducted. The seeming lack of default security measures such as access control and logging has prompted this examination. A survey into the top ranked NoSQL databases was conducted to establish what authentication and authorisation features are available. Additionally the provided logging mechanisms were also examined since access control without any auditing would not aid forensic attribution tremendously. Some of the surveyed NoSQL databases do not provide adequate access control mechanisms and logging features that leave relevant traces to allow forensic attribution to be done using those. The other surveyed NoSQL databases did provide adequate mechanisms and logging traces for forensic attribution, but they are not enabled or configured by default. This means that in many cases they might not be available, leading to insufficient information to perform accurate forensic attribution even on those databases.en_ZA
dc.description.departmentComputer Scienceen_ZA
dc.description.librarianam2019en_ZA
dc.description.urihttp://www.saiee.org.za/DirectoryDisplay/DirectoryCMSPages.aspx?name=Publications#id=1588&dirname=ARJ&dirid=337en_ZA
dc.identifier.citationHauger, W.K. & Olivier, M.S. 2018, 'NoSQL databases : forensic attribution implications', SAIEE Africa Research Journal, vol. 109, no. 2, pp. 119-132.en_ZA
dc.identifier.issn1991-1696
dc.identifier.urihttp://hdl.handle.net/2263/68549
dc.language.isoenen_ZA
dc.publisherSouth African Institute of Electrical Engineersen_ZA
dc.rights© 2018 South African Institute of Electrical Engineersen_ZA
dc.subjectDatabase forensicsen_ZA
dc.subjectForensic attributionen_ZA
dc.subjectNoSQLen_ZA
dc.subjectSurveyen_ZA
dc.subjectDigital forensicsen_ZA
dc.subjectSystem implementationen_ZA
dc.subjectSensitive informationen_ZA
dc.subjectSecurity featuresen_ZA
dc.subjectLogging mechanismen_ZA
dc.subjectForensic examinationen_ZA
dc.subjectAccess control mechanismen_ZA
dc.subjectSurveyingen_ZA
dc.subjectPersonal computingen_ZA
dc.subjectDatabase systemsen_ZA
dc.subjectAuthenticationen_ZA
dc.titleNoSQL databases : forensic attribution implicationsen_ZA
dc.typeArticleen_ZA

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Hauger_NoSQL_2018.pdf
Size:
133.28 KB
Format:
Adobe Portable Document Format
Description:
Article

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.75 KB
Format:
Item-specific license agreed upon to submission
Description: