Secure Audit Logs with Verifiable Excerpts

被引:10
作者
Hartung, Gunnar [1 ]
机构
[1] Karlsruhe Inst Technol, D-76021 Karlsruhe, Germany
来源
TOPICS IN CRYPTOLOGY - CT-RSA 2016 | 2016年 / 9610卷
关键词
Secure audit logs; Log files; Excerpts; Forward security; SIGNATURES;
D O I
10.1007/978-3-319-29485-8_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Log files are the primary source of information when the past operation of a computing system needs to be determined. Keeping correct and accurate log files is important for after-the-fact forensics, as well as for system administration, maintenance, and auditing. Therefore, a line of research has emerged on how to cryptographically protect the integrity of log files even against intruders who gain control of the logging machine. We contribute to this line of research by devising a scheme where one can verify integrity not only of the log file as a whole, but also of excerpts. This is helpful in various scenarios, including cloud provider auditing.
引用
收藏
页码:183 / 199
页数:17
相关论文
共 27 条
  • [21] Marson Giorgia Azzurra, 2013, Computer Security - ESORICS 2013. 18th European Symposium on Research in Computer Security. Proceedings: LNCS 8134, P111, DOI 10.1007/978-3-642-40203-6_7
  • [22] Song D.X., 2001, ACM C COMPUTER COMMU, P225
  • [23] Stathopoulos V, 2006, LECT NOTES COMPUT SC, V4347, P273
  • [24] Yavuz A.A., 2012, Revised Selected Papers, V16, P148
  • [25] BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems
    Yavuz, Attila A.
    Ning, Peng
    Reiter, Michael K.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2012, 15 (02)
  • [26] BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
    Yavuz, Attila A.
    Ning, Peng
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 219 - 228
  • [27] Zhang JH, 2003, LECT NOTES COMPUT SC, V2836, P292