Paper 2016/283
Secure Audit Logs with Verifiable Excerpts
Gunnar Hartung
Abstract
Log files are the primary source of information when the past peration of a computing system needs to be determined. Keeping correct and accurate log files is importantfor after-the-fact forensics, as well as for system administration, maintenance, and auditing. Therefore, a line of research has emerged on how to cryptographically protect the integrity of log files even against intruders who gain control of the logging machine. We contribute to this line of research by devising a scheme where one can verify integrity not only of the log file as a whole, but also of excerpts. This is helpful in various scenarios, including cloud provider auditing.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Published elsewhere. Major revision. CT-RSA 2016
- DOI
- 10.1007/978-3-319-29485-8_11
- Keywords
- Secure Audit LogsLog FilesExcerptsForward Security
- Contact author(s)
- gunnar hartung @ kit edu
- History
- 2016-03-15: revised
- 2016-03-15: received
- See all versions
- Short URL
- https://ia.cr/2016/283
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/283, author = {Gunnar Hartung}, title = {Secure Audit Logs with Verifiable Excerpts}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/283}, year = {2016}, doi = {10.1007/978-3-319-29485-8_11}, url = {https://eprint.iacr.org/2016/283} }