Skip to main content

2024 | OriginalPaper | Buchkapitel

11. Building Resilient Digital Forensic Frameworks for NoSQL Database: Harnessing the Blockchain and Quantum Technology

verfasst von : Rizwan Ur Rahman, Kuldeep Singh, Deepak Singh Tomar, Rabia Musheer

Erschienen in: Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Digital forensics is the process of gathering, examining, and presenting digital evidence from devices like computers, smart phones, and cameras with supporting documentation. Investigating cybercrimes, retrieving deleted data, confirming the veracity of documents and photos, and locating the source and location of digital information are just a few of the many uses for digital forensics. The process of investigating logs of database systems and metadata to search for clues and signs of criminal activity or security breaches is called database forensics. Forensic experts could recover lost or damaged data with tools of database forensics and determine the origin, nature, and scope of an attack. Two cutting-edge technologies that can be employed in digital forensics are blockchain and quantum computing. While quantum computing can be used to find patterns and encrypt data, blockchain can be used to guarantee the accuracy of logs and monitor data flow. These technologies offer verifiable audit trails, an unbreakable chain of custody, and secure storage of forensic artifacts for forensic investigators. Digital forensic professionals must develop quantum-safe digital evidence preservation techniques and deal with other issues brought on by quantum computing. However, with careful planning and preparation, these difficulties are surmountable. For the wide-column store NoSQL database, we provide a six-phase forensic investigation framework in this chapter. Our system includes the full process of forensic examination, from preparation to reporting, in contrast to other studies that concentrated on particular parts of NoSQL forensics, such as transaction log analysis or deleted data recovery. We also discuss the difficulties associated with finding and evaluating distributed evidence in a NoSQL setting, which is distinct from a relational DBMS. Our system may be used with a variety of documents and wide-column NoSQL DBMSs including MongoDB, CouchDB, and Cassandra. We do a case study using Cassandra as an illustration to show its efficacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Becker MY, Sewell P (2004) Cassandra: flexible trust management, applied to electronic health records. In: Proceedings 17th IEEE computer security foundations workshop. IEEE, pp 139–154 Becker MY, Sewell P (2004) Cassandra: flexible trust management, applied to electronic health records. In: Proceedings 17th IEEE computer security foundations workshop. IEEE, pp 139–154
Zurück zum Zitat Breeuwsma M, De Jongh M, Klaver C, Van Der Knijff R, Roeloffs M (2007) Forensic data recovery from flash memory. Small Scale Digit Device Forens J 1(1):1–17 Breeuwsma M, De Jongh M, Klaver C, Van Der Knijff R, Roeloffs M (2007) Forensic data recovery from flash memory. Small Scale Digit Device Forens J 1(1):1–17
Zurück zum Zitat Chandra DG (2015) BASE analysis of NoSQL database. Futur Gener Comput Syst 52:13–21CrossRef Chandra DG (2015) BASE analysis of NoSQL database. Futur Gener Comput Syst 52:13–21CrossRef
Zurück zum Zitat Conti M, Gangwal A, Ruj S (2018) On the economic significance of ransomware campaigns: a Bitcoin transactions perspective. Comput Secur 79:162–189CrossRef Conti M, Gangwal A, Ruj S (2018) On the economic significance of ransomware campaigns: a Bitcoin transactions perspective. Comput Secur 79:162–189CrossRef
Zurück zum Zitat Eskandari S, Leoutsarakos A, Mursch T, Clark J (2018) A first look at browser-based cryptojacking. In: 2018 IEEE European symposium on security and privacy workshops (EuroS&PW). IEEE, pp 58–66 Eskandari S, Leoutsarakos A, Mursch T, Clark J (2018) A first look at browser-based cryptojacking. In: 2018 IEEE European symposium on security and privacy workshops (EuroS&PW). IEEE, pp 58–66
Zurück zum Zitat Fan J, Han F, Liu H (2014) Challenges of big data analysis. Natl Sci Rev 1(2):293–314CrossRef Fan J, Han F, Liu H (2014) Challenges of big data analysis. Natl Sci Rev 1(2):293–314CrossRef
Zurück zum Zitat Glanz O (2016) ETCBC-vm v1. 62. Lubuntu 16.04 64bit Glanz O (2016) ETCBC-vm v1. 62. Lubuntu 16.04 64bit
Zurück zum Zitat Haerder T, Reuter A (1983) Principles of transaction-oriented database recovery. ACM Comput Surv (CSUR) 15(4):287–317CrossRef Haerder T, Reuter A (1983) Principles of transaction-oriented database recovery. ACM Comput Surv (CSUR) 15(4):287–317CrossRef
Zurück zum Zitat Han J, Haihong E, Le G, Du J (2011) Survey on NoSQL database. In: 2011 6th International conference on pervasive computing and applications. IEEE, pp 363–366 Han J, Haihong E, Le G, Du J (2011) Survey on NoSQL database. In: 2011 6th International conference on pervasive computing and applications. IEEE, pp 363–366
Zurück zum Zitat Ieong RS (2006) FORZA–Digital forensics investigation framework that incorporate legal issues. Digit Investig 3:29–36 Ieong RS (2006) FORZA–Digital forensics investigation framework that incorporate legal issues. Digit Investig 3:29–36
Zurück zum Zitat Ioannidis S, Keromytis AD, Bellovin SM, Smith JM (2000) Implementing a distributed firewall. In: Proceedings of the 7th ACM conference on computer and communications security, pp 190–199 Ioannidis S, Keromytis AD, Bellovin SM, Smith JM (2000) Implementing a distributed firewall. In: Proceedings of the 7th ACM conference on computer and communications security, pp 190–199
Zurück zum Zitat Ivanov T, Niemann R, Izberovic S, Rosselli M, Tolle K, Zicari RV (2015) Performance evaluation of enterprise big data platforms with HiBench. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol 2. IEEE, pp 120–127 Ivanov T, Niemann R, Izberovic S, Rosselli M, Tolle K, Zicari RV (2015) Performance evaluation of enterprise big data platforms with HiBench. In: 2015 IEEE Trustcom/BigDataSE/ISPA, vol 2. IEEE, pp 120–127
Zurück zum Zitat Keplinger K (2018) Is quantum computing becoming relevant to cyber-security? Netw Secur 2018(9):16–19CrossRef Keplinger K (2018) Is quantum computing becoming relevant to cyber-security? Netw Secur 2018(9):16–19CrossRef
Zurück zum Zitat Khan MNA, Ullah S (2017) A log aggregation forensic analysis framework for cloud computing environments. Comput Fraud Secur 2017(7):11–16CrossRef Khan MNA, Ullah S (2017) A log aggregation forensic analysis framework for cloud computing environments. Comput Fraud Secur 2017(7):11–16CrossRef
Zurück zum Zitat Khan SN, Loukil F, Ghedira-Guegan C, Benkhelifa E, Bani-Hani A (2021) Blockchain smart contracts: applications, challenges, and future trends. Peer-to-Peer Netw Appl 14:2901–2925CrossRef Khan SN, Loukil F, Ghedira-Guegan C, Benkhelifa E, Bani-Hani A (2021) Blockchain smart contracts: applications, challenges, and future trends. Peer-to-Peer Netw Appl 14:2901–2925CrossRef
Zurück zum Zitat Menard S (2002) Applied logistic regression analysis (No. 106). Sage Menard S (2002) Applied logistic regression analysis (No. 106). Sage
Zurück zum Zitat Montgomery DC, Peck EA, Vining GG (2021) Introduction to linear regression analysis. Wiley Montgomery DC, Peck EA, Vining GG (2021) Introduction to linear regression analysis. Wiley
Zurück zum Zitat Okman L, Gal-Oz N, Gonen Y, Gudes E, Abramov J (2011) Security issues in NoSQL databases. In: 2011 IEEE 10th International conference on trust, security and privacy in computing and communications. IEEE, pp 541–547 Okman L, Gal-Oz N, Gonen Y, Gudes E, Abramov J (2011) Security issues in NoSQL databases. In: 2011 IEEE 10th International conference on trust, security and privacy in computing and communications. IEEE, pp 541–547
Zurück zum Zitat Oliner A, Ganapathi A, Xu W (2012) Advances and challenges in log analysis. Commun ACM 55(2):55–61CrossRef Oliner A, Ganapathi A, Xu W (2012) Advances and challenges in log analysis. Commun ACM 55(2):55–61CrossRef
Zurück zum Zitat Rahman RU, Tomar DS (2018) Security attacks on wireless networks and their detection techniques. In: Emerging wireless communication and network technologies: principle, paradigm and performance, pp 241–270 Rahman RU, Tomar DS (2018) Security attacks on wireless networks and their detection techniques. In: Emerging wireless communication and network technologies: principle, paradigm and performance, pp 241–270
Zurück zum Zitat Rahman RU, Tomar DS (2020a) New biostatistics features for detecting web bot activity on web applications. Comput Secur 97:102001CrossRef Rahman RU, Tomar DS (2020a) New biostatistics features for detecting web bot activity on web applications. Comput Secur 97:102001CrossRef
Zurück zum Zitat Rahman RU, Tomar DS (2020b) A new web forensic framework for bot crime investigation. Forens Sci Int Digit Investig 33:300943 Rahman RU, Tomar DS (2020b) A new web forensic framework for bot crime investigation. Forens Sci Int Digit Investig 33:300943
Zurück zum Zitat Raut ABPD (2017) NOSQL database and its comparison with RDBMS. Int J Comput Intell Res 13(7):1645–1651 Raut ABPD (2017) NOSQL database and its comparison with RDBMS. Int J Comput Intell Res 13(7):1645–1651
Zurück zum Zitat Reith M, Carr C, Gunsch G (2002) An examination of digital forensic models. Int J Digit Evid 1(3):1–12 Reith M, Carr C, Gunsch G (2002) An examination of digital forensic models. Int J Digit Evid 1(3):1–12
Zurück zum Zitat Scarani V, Bechmann-Pasquinucci H, Cerf NJ, Dušek M, Lütkenhaus N, Peev M (2009) The security of practical quantum key distribution. Rev Mod Phys 81(3):1301CrossRef Scarani V, Bechmann-Pasquinucci H, Cerf NJ, Dušek M, Lütkenhaus N, Peev M (2009) The security of practical quantum key distribution. Rev Mod Phys 81(3):1301CrossRef
Zurück zum Zitat Selamat SR, Yusof R, Sahib S (2008) Mapping process of digital forensic investigation framework. Int J Comput Sci Netw Secur 8(10):163–169 Selamat SR, Yusof R, Sahib S (2008) Mapping process of digital forensic investigation framework. Int J Comput Sci Netw Secur 8(10):163–169
Zurück zum Zitat Van Wijk JJ (2005) The value of visualization. In: VIS 05. IEEE visualization. IEEE, pp 79–86 Van Wijk JJ (2005) The value of visualization. In: VIS 05. IEEE visualization. IEEE, pp 79–86
Zurück zum Zitat Yeong W, Howes T, Kille S (1995) Lightweight directory access protocol (No. rfc1777) Yeong W, Howes T, Kille S (1995) Lightweight directory access protocol (No. rfc1777)
Zurück zum Zitat Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375CrossRef Zheng Z, Xie S, Dai HN, Chen X, Wang H (2018) Blockchain challenges and opportunities: a survey. Int J Web Grid Serv 14(4):352–375CrossRef
Metadaten
Titel
Building Resilient Digital Forensic Frameworks for NoSQL Database: Harnessing the Blockchain and Quantum Technology
verfasst von
Rizwan Ur Rahman
Kuldeep Singh
Deepak Singh Tomar
Rabia Musheer
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0088-2_11