Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs
نویسندگان
چکیده
Tamperproof audit logs are an essential tool for computer forensics. Building on the work in [SK98,SK99], we show how to build a tamperproof audit log where the amount of information exchange required to verify the entries in the audit log is greatly reduced. By making audit-log verification more efficient, this system is more suitable for implementation in low-bandwidth environments.
منابع مشابه
Tamper Detection in Audit Logs
Audit logs are considered good practice for business systems, and are required by federal regulations for secure systems, drug approval data, medical information disclosure, financial records, and electronic voting. Given the central role of audit logs, it is critical that they are correct and inalterable. It is not sufficient to say, “our data is correct, because we store all interactions in a...
متن کاملBuilding an Encrypted and Searchable Audit Log
Audit logs are an important part of any secure system, and they need to be carefully designed in order to give a faithful representation of past system activity. This is especially true in the presence of adversaries who might want to tamper with the audit logs. While it is important that auditors can inspect audit logs to assess past system activity, the content of an audit log may contain sen...
متن کاملSecure Coding: Principles and Practices Creating a National Alerting and Reporting Service
E. Larry Lidz, University of Chicago Looking at problems from the network: Often, we don’t have access to the machine we suspect of being involved in a compromise (the machine is physically inaccessible, it belongs to a student, etc.). Network audit logs can save the day: If we are able to go back and show where a problem came from, we can quickly resolve the problem. Also, if it is necessary t...
متن کاملAnalysis of the Serengeti Broadband Network
Internet access is intermittent and very expensive in remote areas in the developing world. The access is still mainly provided via satellite links to other continents and, although the transition to terrestrial networks has started, it will take time to reach the under-served areas. To understand the local needs and traffic patterns in rural areas, we have analyzed Internet web traffic logs ca...
متن کاملExtending Access Management to maintain audit logs in cloud computing
considering the most often talked about security risks in cloud computing, like, security and compliance, viability, lack of transparency, reliability and performance issues. Bringing strong auditability in cloud services can reduce these risks to a great extent. Also, auditing, both internally and externally is generally required and sometimes unavoidable looking into the present day competiti...
متن کامل