Paper 2014/1002

Experiments in Encrypted and Searchable Network Audit Logs

Bhanu Prakash Gopularam, Sashank Dara, and Nalini N

Abstract

We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. 2nd International Research Conference on Emerging Information Technology and Engineering Solutions
Keywords
network telemetryidentity based encryptionaudit log privacy
Contact author(s)
bhanuprakash gopularam @ gmail com
History
2014-12-18: received
Short URL
https://ia.cr/2014/1002
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/1002,
      author = {Bhanu Prakash Gopularam and Sashank Dara and Nalini N},
      title = {Experiments in Encrypted and Searchable Network Audit Logs},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/1002},
      year = {2014},
      url = {https://eprint.iacr.org/2014/1002}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.