BBox: A Distributed Secure Log Architecture
نویسنده
چکیده
This paper presents BBox, a digital black box to provide for authentic archiving in distributed systems. Based upon public key cryptography and trusted computing platforms, the BBox employs standard primitives to ensure the authenticity of records during the transmission from devices to the collector, as well as during their storage on the collector and retrieval by auditors. Besides presenting the technical underpinnings of the BBox, this paper demonstrates the authenticity guarantees it ensures and reports on the preliminary deployment figures.
منابع مشابه
A secure log architecture to support remote auditing
This paper presents BBox, a digital black box to provide for authentic archiving (and, consequently, forensic evidence) for remote auditing in distributed systems. Based upon public key cryptography and trusted computing platforms, the BBox employs standard primitives to ensure the authenticity of records during the transmission from devices to the collector, as well as during their storage on ...
متن کاملAutomated counterexample-driven audits of authentic system records
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv 1 Audit: An Approach to Generate Evidence . . . . . . . . . . . . . . . . . . . 1 1.1 IT Audits and their Building Blocks . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1.1 Audit and Policy Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.1.2 A...
متن کاملDesign of a Log Server for Distributed and Large-Scale Server Environments
Collection, storage and analysis of multiple hosts’ audit trails in a distributed manner are known as a major requirement, as well as a major challenge for enterprise-scale computing environments. To ease these tasks, and to provide a central management facility, a software-suit, named as “LogHunter” has been developed. Log-Hunter is a secure distributed log server system which involves log col...
متن کاملSecure Interoperation of Secure Distributed Databases an Architecture Veriication Case Study
This paper describes the process of implementing an architecture for secure distributed transaction processing, the process of verifying that it has the desired security properties, and the implementation that resulted. The implementation and veriication processes provided us with valuable experience relevant to answering several questions posed by our research on transformational development o...
متن کامل"Secure" Log-Linear and Logistic Regression Analysis of Distributed Databases
The machine learning community has focused on confidentiality problems associated with statistical analyses that “integrate” data stored in multiple, distributed databases where there are barriers to simply integrating the databases. This paper discusses various techniques which can be used to perform statistical analysis for categorical data, especially in the form of log-linear analysis and l...
متن کامل