Cryptology ePrint Archive: Report 2014/1002
Experiments in Encrypted and Searchable Network Audit Logs
Bhanu Prakash Gopularam and Sashank Dara and Nalini N
Abstract: We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.
Category / Keywords: implementation / network telemetry, identity based encryption, audit log privacy
Original Publication (in the same form): 2nd International Research Conference on Emerging Information Technology and Engineering Solutions
Date: received 16 Dec 2014, last revised 16 Dec 2014
Contact author: bhanuprakash gopularam at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20141218:035308 (All versions of this report)
Short URL: ia.cr/2014/1002
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]