Long time listener, first time caller.
'Say you have a database table that is responsible for logging user activity. The integrity of this log is important, so you want to be able to detect if someone has modified any data from the table. To make things more interesting, also consider the fact that your system may be operated by an evil SQL admin who has complete control over this wretched system. yikes...
How would you safeguard your data?
How would you detect if someone has tampered with your data?
You have unlimited tools at your disposal. (i.e. hashing, encrypting, etc.)
There are two intresting research papers on this topic One of them proposes usage of HMAC alogrith. The other proposes use of Condensed- RSA scheme and BGLS signature scheme.
Authentication and Integrity in Outsourced Databases
http://www.isoc.org/isoc/conferences/ndss/04/proceedings/Papers/Mykletun.pdf
A Generic Distortion Free Watermarking Technique for Relational Databases
http://www.dsi.unive.it/~cortesi/paperi/iciss09.pdf
I feel both are vaible solutions based on the amount of percieved risk. --Kiran.Kumar