Cryptology ePrint Archive: Report 2014/1002

Experiments in Encrypted and Searchable Network Audit Logs

Bhanu Prakash Gopularam and Sashank Dara and Nalini N

Abstract: We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.

Category / Keywords: implementation / network telemetry, identity based encryption, audit log privacy

Original Publication (in the same form): 2nd International Research Conference on Emerging Information Technology and Engineering Solutions

Date: received 16 Dec 2014, last revised 16 Dec 2014

Contact author: bhanuprakash gopularam at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20141218:035308 (All versions of this report)

Short URL: ia.cr/2014/1002

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]