BAFi: a practical cryptographic secure audit logging scheme for digital forensics

被引:2
|
作者
Kampanakis, Panos [1 ]
Yavuz, Attila A. [2 ]
机构
[1] Cisco Syst, Secur Res & Operat, San Jose, CA 95134 USA
[2] Univ Pittsburgh, Pittsburgh, PA 15260 USA
关键词
secure audit logging; applied cryptography; digital forensics; forward-secure; signature aggregation;
D O I
10.1002/sec.1242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Audit logs provide information about historical states of computer systems. They also contain highly valuable data that can be used by law enforcement in forensic investigations. Thus, ensuring the authenticity and integrity of audit logs is of vital importance. An ideal security mechanism for audit logging must also satisfy security properties such as forward-security (compromise resiliency), compactness, and computational efficiency. Unfortunately, existing secure audit logging schemes lack the computational or storage efficiency for modern performance requirements. Indeed, the practicality of such schemes has not been investigated in real-life systems, where logs generated in various occasions could be terabytes of data per day. To address this limitation, we developed an efficient, publicly verifiable, forward-secure, privacy-preserving, and aggregate logging scheme called blind-aggregate-forward improved (BAFi). BAFi is based on BAF, with new properties and performance improvements as follows: (i) BAFi improves the efficiency of BAF via implementation specific optimizations; (ii) BAFi has the option to not expose sensitive information in logs to protect valuable forensic information; (iii) BAFi was experimentally tested in real-world logs; and (iv) BAFi improves the security of BAF against log substitution. Our analysis shows that BAFi outperforms previous alternatives with similar properties and therefore is an ideal solution for nowadays highly intense logging systems. Copyright (c) 2015John Wiley & Sons, Ltd.
引用
收藏
页码:3180 / 3190
页数:11
相关论文
共 50 条
  • [1] A secure virtualized logging scheme for digital forensics in comparison with kernel module approach
    Chou, Bin-Hui
    Tatara, Kohei
    Sakuraba, Taketoshi
    Hori, Yoshiaki
    Sakurai, Kouichi
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 421 - +
  • [2] Secure Logging Monitor Service for Cloud Forensics
    Wu, Songyang
    Zhang, Yong
    [J]. 2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 757 - 762
  • [3] FAL: A Forensics Aware Language for Secure Logging
    Zawoad, Shams
    Mernik, Marjan
    Hasan, Ragib
    [J]. 2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1579 - 1586
  • [4] BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
    Yavuz, Attila A.
    Ning, Peng
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 219 - 228
  • [5] Towards a practical cloud forensics logging framework
    Pichan, Ameer
    Lazarescu, Mihai
    Soh, Sie Teng
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 42 : 18 - 28
  • [6] Compact and Resilient Cryptographic Tools for Digital Forensics
    Seyitoglu, Efe U. A.
    Yavuz, Attila A.
    Ozmen, Muslum Ozgur
    [J]. 2020 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2020,
  • [7] Cryptographic Techniques for Data Privacy in Digital Forensics
    Ogunseyi, Taiwo Blessing
    Adedayo, Oluwasola Mary
    [J]. IEEE ACCESS, 2023, 11 : 142392 - 142410
  • [8] DistLog: A distributed logging scheme for IoT forensics
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    Couturier, Raphael
    [J]. AD HOC NETWORKS, 2020, 98 (98)
  • [9] Towards Building a Forensics Aware Language for Secure Logging
    Zawoad, Shams
    Mernik, Marjan
    Hasan, Ragib
    [J]. COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 11 (04) : 1291 - 1314
  • [10] SOCIALLY SECURE CRYPTOGRAPHIC ELECTION SCHEME
    SLESSENGER, PH
    [J]. ELECTRONICS LETTERS, 1991, 27 (11) : 955 - 957