BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems

被引:46
作者
Yavuz, Attila A. [1 ]
Ning, Peng [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
来源
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE | 2009年
关键词
Applied cryptography; secure audit logging; digital forensics; forward security; signature aggregation;
D O I
10.1109/ACSAC.2009.28
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modem computer systems. Providing security for audit logs on an untrusted machine in a large distributed system is a challenging task, especially in the presence of active adversaries. In such a system, it is critical to have forward security such that when an adversary compromises a machine, she cannot modify or forge the log entries accumulated before the compromise. Unfortunately, existing secure audit logging schemes have significant limitations that make them impractical for real-life applications: Existing Public Key Cryptography (PKC) based schemes are computationally expensive for logging in task intensive or resource-constrained systems, while existing symmetric schemes are not publicly verifiable and incur significant storage and communication overheads. In this paper, we propose a novel forward secure and aggregate logging scheme called Blind-Aggregate-Forward (BAF) logging scheme, which is suitable for large distributed systems. BAF can produce publicly verifiable forward secure and aggregate signatures with near-zero computational, storage, and communication costs for the loggers, without requiring any online Trusted Third Party (TTP) support. We prove that BAF is secure under appropriate computational assumptions, and demonstrate that BAF is significantly more efficient and scalable than the previous schemes. Therefore, BAF is an ideal solution for secure logging in both task intensive and resource-constrained systems.
引用
收藏
页码:219 / 228
页数:10
相关论文
共 28 条
  • [1] Abdalla M, 2000, LECT NOTES COMPUT SC, V1976, P116
  • [2] [Anonymous], 1997, Technical Report
  • [3] [Anonymous], P 2000 IEEE S SEC PR
  • [4] [Anonymous], P SIGCOMM
  • [5] Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1
  • [6] Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
  • [7] BELLARE M, P 19 ANN INT CYRPT C, P431
  • [8] BELLARE M, 1997, EUROCRYPT 97, P163
  • [9] Bellare P., 1993, P 1 ACM C COMP COMM, P62, DOI DOI 10.1145/168588.168596
  • [10] Boldyreva A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P276