Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs

نویسندگان

  • John Kelsey
  • Bruce Schneier
چکیده

Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of information exchange required to verify the entries in the audit log is greatly reduced. By making audit-log verification more efficient, this system is more suitable for implementation in low-bandwidth environments.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tamper Detection in Audit Logs

Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, financial records, and electronic voting. Given the central role of audit logs, it is critical that they are correct and inalterable. It is not sufficient to say, “our data is correct, because we store all interactions in a...

متن کامل

Building an Encrypted and Searchable Audit Log

Audit logs are an important part of any secure system, and they need to be carefully designed in order to give a faithful representation of past system activity. This is especially true in the presence of adversaries who might want to tamper with the audit logs. While it is important that auditors can inspect audit logs to assess past system activity, the content of an audit log may contain sen...

متن کامل

Secure Coding: Principles and Practices Creating a National Alerting and Reporting Service

E. Larry Lidz, University of Chicago Looking at problems from the network: Often, we don’t have access to the machine we suspect of being involved in a compromise (the machine is physically inaccessible, it belongs to a student, etc.). Network audit logs can save the day: If we are able to go back and show where a problem came from, we can quickly resolve the problem. Also, if it is necessary t...

متن کامل

Analysis of the Serengeti Broadband Network

Internet access is intermittent and very expensive in remote areas in the developing world. The access is still mainly provided via satellite links to other continents and, although the transition to terrestrial networks has started, it will take time to reach the under-served areas. To understand the local needs and traffic patterns in rural areas, we have analyzed Internet web traffic logs ca...

متن کامل

Extending Access Management to maintain audit logs in cloud computing

considering the most often talked about security risks in cloud computing, like, security and compliance, viability, lack of transparency, reliability and performance issues. Bringing strong auditability in cloud services can reduce these risks to a great extent. Also, auditing, both internally and externally is generally required and sometimes unavoidable looking into the present day competiti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999