Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1151828.1151852dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
Article
Free access

Logcrypt: forward security and public verification for secure audit logs

Published: 01 January 2006 Publication History
  • Get Citation Alerts
  • Abstract

    Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We build on prior work by showing how log creation can be separated from log verification, and describing several additional performance and convenience features not previously considered.

    References

    [1]
    {1} M. Bellare and P. Rogaway, Random Oracles are Practical: A Paradigm for Designing Efficient Protocols, ACM Conference on computer and Communications Security 1993, pp62-73.]]
    [2]
    {2} M. Bellare, S. Miner. A Forward-Secure Digital Signature Scheme. In Proc. of Crypto, pp. 431- 448, 1999.]]
    [3]
    {3} M. Bellare and B. Yee, "Forward Integrity for Secure Audit Logs," Technical Report, Computer Science and Engineering Department, University of California at San Diego, November 1997.]]
    [4]
    {4} J. Cha, J. Cheon, "An ID-based signature from Gap-Diffle-Hellman Groups," Proc. of PKC 2003, Lecture Notes in Computer Science, Vol. 2567, pp. 18-30 (2003).]]
    [5]
    {5} C. N. Chong, Z. Peng, and P. H. Hartel. Secure audit logging with tamper resistant hard-ware. Technical report TR-CTIT-02-29, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, Aug 2002.]]
    [6]
    {6} A Cost-Based Security Analysis of Symmetric and Asymmetric Key Lengths, RSA Laboratories Bulletin #13, April 2000.]]
    [7]
    {7} A. Futoransky and E. Kargieman. PEO Revised. DISC 98 (Diá Intrenacional de la Seguridad en Cómputo). DF, Mexico. 1998.]]
    [8]
    {8} A. Futoransky and E. Kargieman. VCR y PEO, dos protocolos criptográficos simples. 25 Jornadas Argentinas de Informática e Investigación Operativa, July 1995.]]
    [9]
    {9} J. Kelsey, B. Schneier. Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. Recent Advances in Intrusion Detection, 1999.]]
    [10]
    {10} MSyslog (Unix syslogd with integrity protection). http://oss.coresecurity.com/projects/msyslog.html]]
    [11]
    {11} H. Orman and P. Hoffman, Determining Strengths For Public Keys Used For Exchanging Symmetric Keys, Internet Engineering Task Force RFC 3766, April 2004.]]
    [12]
    {12} B. Schneier, J. Kelsey. Cryptographic Support for Secure Logs on Untrusted Machines. In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, Jan. 1998.]]
    [13]
    {13} B. Schneier, J. Kelsey. Secure Audit Logs to Support Computer Forensics. ACM Transactions on Information and System Security 2(2): 159-176, 1999.]]
    [14]
    {14} K. Thompson, "Reflections on Trusting Trust," Communications of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763.]]
    [15]
    {15} B. R. Waters, D. Balfanz, G. Durfee, D. K. Smetters. Building an Encrypted and Searchable Audit Log. ACM Annual Symposium on Network and Distributed System Security, 2004]]

    Cited By

    View all
    • (2023)Rethinking People Analytics With Inverse Transparency by DesignProceedings of the ACM on Human-Computer Interaction10.1145/36100837:CSCW2(1-29)Online publication date: 4-Oct-2023
    • (2019)EngraveChainProceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor10.1145/3362744.3363346(8-14)Online publication date: 10-Nov-2019
    • (2019)How to Securely Record Logs based on ARM TrustZoneProceedings of the 2019 ACM Asia Conference on Computer and Communications Security10.1145/3321705.3331001(664-666)Online publication date: 2-Jul-2019
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image DL Hosted proceedings
    ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
    January 2006
    230 pages

    Publisher

    Australian Computer Society, Inc.

    Australia

    Publication History

    Published: 01 January 2006

    Qualifiers

    • Article

    Conference

    ACSW Frontiers '06
    ACSW Frontiers '06: Grid computing and e-research
    January 16 - 19, 2006
    Tasmania, Hobart, Australia

    Acceptance Rates

    Overall Acceptance Rate 204 of 424 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)74
    • Downloads (Last 6 weeks)15

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Rethinking People Analytics With Inverse Transparency by DesignProceedings of the ACM on Human-Computer Interaction10.1145/36100837:CSCW2(1-29)Online publication date: 4-Oct-2023
    • (2019)EngraveChainProceedings of the 2nd Workshop on Blockchain-enabled Networked Sensor10.1145/3362744.3363346(8-14)Online publication date: 10-Nov-2019
    • (2019)How to Securely Record Logs based on ARM TrustZoneProceedings of the 2019 ACM Asia Conference on Computer and Communications Security10.1145/3321705.3331001(664-666)Online publication date: 2-Jul-2019
    • (2019)Public audit for operation behavior logs with error locating in cloud storageSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-018-3038-823:11(3779-3792)Online publication date: 1-Jun-2019
    • (2018)A framework with data-centric accountability and auditability for cloud storageThe Journal of Supercomputing10.1007/s11227-018-2504-574:11(5903-5926)Online publication date: 1-Nov-2018
    • (2016)Secure Audit Logs with Verifiable ExcerptsProceedings of the RSA Conference on Topics in Cryptology - CT-RSA 2016 - Volume 961010.1007/978-3-319-29485-8_11(183-199)Online publication date: 29-Feb-2016
    • (2015)Equivalence-based Security for Querying Encrypted DatabasesProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2813638(1130-1143)Online publication date: 12-Oct-2015
    • (2015)BAFiSecurity and Communication Networks10.1002/sec.12428:17(3180-3190)Online publication date: 25-Nov-2015
    • (2013)Distributed privacy-preserving transparency loggingProceedings of the 12th ACM workshop on Workshop on privacy in the electronic society10.1145/2517840.2517847(83-94)Online publication date: 4-Nov-2013
    • (2012)Authenticating operation-based history in collaborative systemsProceedings of the 2012 ACM International Conference on Supporting Group Work10.1145/2389176.2389197(131-140)Online publication date: 27-Oct-2012
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media