Improvising Forward Stream Integrity for Secure Logging in the Cloud
نویسنده
چکیده
The need for secure logging is well-understood by the security professionals, together with each researchers and practitioners. The flexibility to the accuracy verifies all (or some) log entries is very important to any application using secure logging techniques. During this paper, we start by examining progressive in secure logging and determine some issues inherent to systems supported trusty third-party servers in the cloud. We tend to then propose a distinct approach to secure logging primarily based upon recently developed Forward-Secure consecutive aggregate (FssAgg) authentication techniques. Our approach offers each space-efficiency and obvious security. we tend to illustrate two concrete schemes one private-verifiable and one publicverifiable that provide sensible secure logging with none reliance on on-line trustworthy third parties or secure hardware. We tend to additionally investigate the thought of immutability within the context of forward secure sequential aggregate authentication to produce finer grained verification. Finally, we tend to report on some expertise with a prototype built upon a preferred code version control system.
منابع مشابه
SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملSecure Logging as a Service - Delegating Log Management to the Cloud
Securely maintaining log records over extended periods of time is very important to the proper functioning of any organization. Integrity of the log files and that of the logging process need to be ensured at all times. In addition, as log files often contain sensitive information, confidentiality and privacy of log records are equally important. However, deploying a secure logging infrastructu...
متن کاملFormal Modelling of Resilient Data Storage in Cloud
Reliable and highly performant handling of large data stores constitutes one of the major challenges of cloud computing. In this paper, we propose a formalisation of a cloud solution implemented by F-Secure – a provider of secure data storage services. The solution is based on massive replication and the write-ahead logging mechanism. To achieve high performance, the company has abandoned a tra...
متن کاملInsynd: Privacy-Preserving Transparency Logging Using Balloons
Insynd is a cryptographic scheme for privacy-preserving transparency logging. In the setting of transparency logging, a service provider continuously logs descriptions of its data processing on its users’ personal data, where each description is intended for a particular user. Our work focuses on protecting the privacy of users. Insynd provides secrecy of messages, message integrity and authent...
متن کاملEfficient, Compromise Resilient and Append-only Cryptographic Constructions for Digital Forensics
Due to the forensic value of the audit logs, it is vital to provide forwardsecure integrity and append-only properties in a logging system to prevent attackers who have gained control of the system from modifying or selectively deleting log entries generated before they took control. Existing forward-secure logging solutions are either based on symmetric cryptography or public key cryptography ...
متن کامل