Paper 2014/1002
Experiments in Encrypted and Searchable Network Audit Logs
Bhanu Prakash Gopularam, Sashank Dara, and Nalini N
Abstract
We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.
Metadata
- Available format(s)
- Category
- Implementation
- Publication info
- Published elsewhere. 2nd International Research Conference on Emerging Information Technology and Engineering Solutions
- Keywords
- network telemetryidentity based encryptionaudit log privacy
- Contact author(s)
- bhanuprakash gopularam @ gmail com
- History
- 2014-12-18: received
- Short URL
- https://ia.cr/2014/1002
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/1002, author = {Bhanu Prakash Gopularam and Sashank Dara and Nalini N}, title = {Experiments in Encrypted and Searchable Network Audit Logs}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/1002}, year = {2014}, url = {https://eprint.iacr.org/2014/1002} }