Cryptology ePrint Archive: Report 2016/283
Secure Audit Logs with Verifiable Excerpts
Abstract: Log files are the primary source of information when the past peration of a computing system needs to be determined. Keeping correct and accurate log files is important for after-the-fact forensics, as well as for system administration, maintenance, and auditing. Therefore, a line of research has emerged on how to cryptographically protect the integrity of log files even against intruders who gain control of the logging machine.
We contribute to this line of research by devising a scheme where one can verify integrity not only of the log file as a whole, but also of excerpts. This is helpful in various scenarios, including cloud provider auditing.
Category / Keywords: applications / Secure Audit Logs, Log Files, Excerpts, Forward Security
Original Publication (with major differences): CT-RSA 2016
Date: received 14 Mar 2016, last revised 15 Mar 2016
Contact author: gunnar hartung at kit edu
Available format(s): PDF | BibTeX Citation
Version: 20160315:094903 (All versions of this report)
Short URL: ia.cr/2016/283
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]