Abstract
Where provenance is a relationship between a data item and the location from which this data was copied. In a DBMS, a typical use of where provenance is in establishing a copy-by-address relationship between the output of a query and the particular data value(s) that originated it. Normal DBMS operations create a variety of auxiliary copies of the data (e.g., indexes, MVs, cached copies). These copies exist over time with relationships that evolve continuously – (A) indexes maintain the copy with a reference to the origin value, (B) MVs maintain the copy without a reference to the source table, (C) cached copies are created once and are never maintained. A query may be answered from any of these auxiliary copies; however, this where provenance is not computed or maintained. In this paper, we describe sources from which forensic analysis of storage can derive where provenance of table data. We also argue that this computed where provenance can be useful (and perhaps necessary) for accurate forensic reports and evidence from maliciously altered databases or validation of corrupted DBMS storage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wagner, J., et al.: Carving database storage to detect and trace security breaches. Digit. Invest. 22, S127–S136 (2017)
Wagner, J., Rasin, A., Grier, J.: Database image content explorer: Carving data that does not officially exist. Digit. Invest. 18, S97–S107 (2016)
Wagner, J., Rasin, A., Malik, T., Hart, K., Jehle, H., Grier, J.: Database forensic analysis with DBCarver. In: CIDR (2017)
Acknowledgments
This material is based upon work supported by the National Science Foundation Grant CNS-1656268.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Rasin, A., Malik, T., Wagner, J., Kim, C. (2018). Where Provenance in Database Storage. In: Belhajjame, K., Gehani, A., Alper, P. (eds) Provenance and Annotation of Data and Processes. IPAW 2018. Lecture Notes in Computer Science(), vol 11017. Springer, Cham. https://doi.org/10.1007/978-3-319-98379-0_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-98379-0_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-98378-3
Online ISBN: 978-3-319-98379-0
eBook Packages: Computer ScienceComputer Science (R0)