Secure Audit Logs with Verifiable Excerpts

被引:10
作者
Hartung, Gunnar [1 ]
机构
[1] Karlsruhe Inst Technol, D-76021 Karlsruhe, Germany
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2016 | 2016年 / 9610卷
关键词
Secure audit logs; Log files; Excerpts; Forward security; SIGNATURES;
D O I
10.1007/978-3-319-29485-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Log files are the primary source of information when the past operation of a computing system needs to be determined. Keeping correct and accurate log files is important for after-the-fact forensics, as well as for system administration, maintenance, and auditing. Therefore, a line of research has emerged on how to cryptographically protect the integrity of log files even against intruders who gain control of the logging machine. We contribute to this line of research by devising a scheme where one can verify integrity not only of the log file as a whole, but also of excerpts. This is helpful in various scenarios, including cloud provider auditing.
引用
收藏
页码:183 / 199
页数:17
相关论文
共 27 条
  • [1] Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P441
  • [2] Abdalla M, 2000, LECT NOTES COMPUT SC, V1976, P116
  • [3] Safekeeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges
    Accorsi, Rafael
    [J]. IMF 2009: 5TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSIC, 2009, : 94 - 110
  • [4] [Anonymous], NIST SPECIAL PUBLICA
  • [5] [Anonymous], 1997, TECHNICAL REPORT
  • [6] [Anonymous], 1999, LNCS
  • [7] [Anonymous], 2012, COMMON CRITERIA IN 2
  • [8] [Anonymous], 2004, NDSS
  • [9] [Anonymous], 7 USENIX SEC S P
  • [10] Bellare M, 2003, LECT NOTES COMPUT SC, V2612, P1