A secure logging scheme for forensic computing

被引:2
|
作者
Kawaguchi, N [1 ]
Ueda, S [1 ]
Obata, N [1 ]
Miyaji, R [1 ]
Kaneko, S [1 ]
Shigeno, H [1 ]
Okada, K [1 ]
机构
[1] Keio Univ, Fac Sci & Technol, Yokohama, Kanagawa 2238522, Japan
关键词
forensic computing; logging; signature;
D O I
10.1109/IAW.2004.1437843
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a secure logging scheme for Forensic Computing. Forensic Computing is the process conducted to identify the method of an attack and intruders in the case of system compromise. In Forensic Computing, trustworthy logs admissible for court are needed. Moreover, since the log contains various confidential information, the confidentiality of the log must be preserved. Our scheme achieves the integrity of logs and fine-grained access control for logs with small overhead size using the signature tree and Forward Integrity.
引用
收藏
页码:386 / 393
页数:8
相关论文
共 50 条
  • [1] Secure logging scheme for forensic analysis in cloud
    Sree, Thankaraja Raja
    Bhanu, Somasundaram Mary Saira
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (15):
  • [2] Logging for Cloud Computing Forensic Systems
    Patrascu, A.
    Patriciu, V. V.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2015, 10 (02) : 222 - 229
  • [3] Design of a Forensic Enabled Secure Cloud Logging
    Rane, Sagar
    Wagh, Sanjeev
    Dixit, Arati
    [J]. PROCEEDINGS OF THE 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING (ICDCN 2020), 2020,
  • [4] Logging System for Cloud Computing Forensic Environments
    Pitrascu, Alecsandru
    Patriciu, Victor-Valeriu
    [J]. CONTROL ENGINEERING AND APPLIED INFORMATICS, 2014, 16 (01): : 80 - 88
  • [5] Logging Framework for Cloud Computing Forensic Environments
    Patrascu, Alecsandru
    Patriciu, Victor-Valeriu
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [6] Delegating secure logging in pervasive computing systems
    Accorsi, Rafael
    Hohl, Adolf
    [J]. SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2006, 3934 : 58 - 72
  • [7] A Cryptographic Scheme for Secure Cloud Computing
    Llamas, Alejandro
    Ernesto Gonzalez, Raul
    [J]. 2013 10TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE), 2013, : 221 - 226
  • [8] Secure Event Logging using a Blockchain of Heterogeneous Computing Resources
    Koumidis, K.
    Kolios, P.
    Ellinas, G.
    Panayiotou, C. G.
    [J]. 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [9] An Efficient FHE Scheme to Secure Cloud Computing
    Hariss, Khalil
    Samhat, Abed Ellatif
    Chamoun, Maroun
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 341 - 349
  • [10] BAFi: a practical cryptographic secure audit logging scheme for digital forensics
    Kampanakis, Panos
    Yavuz, Attila A.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3180 - 3190