Cryptology ePrint Archive: Report 2016/283

Secure Audit Logs with Verifiable Excerpts

Gunnar Hartung

Abstract: Log files are the primary source of information when the past peration of a computing system needs to be determined. Keeping correct and accurate log files is important for after-the-fact forensics, as well as for system administration, maintenance, and auditing. Therefore, a line of research has emerged on how to cryptographically protect the integrity of log files even against intruders who gain control of the logging machine. We contribute to this line of research by devising a scheme where one can verify integrity not only of the log file as a whole, but also of excerpts. This is helpful in various scenarios, including cloud provider auditing.

Category / Keywords: applications / Secure Audit Logs, Log Files, Excerpts, Forward Security

Original Publication (with major differences): CT-RSA 2016
DOI:
10.1007/978-3-319-29485-8_11

Date: received 14 Mar 2016, last revised 15 Mar 2016

Contact author: gunnar hartung at kit edu

Available format(s): PDF | BibTeX Citation

Version: 20160315:094903 (All versions of this report)

Short URL: ia.cr/2016/283

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]