Paper 2016/283

Secure Audit Logs with Verifiable Excerpts

Gunnar Hartung

Abstract

Log files are the primary source of information when the past peration of a computing system needs to be determined. Keeping correct and accurate log files is importantfor after-the-fact forensics, as well as for system administration, maintenance, and auditing. Therefore, a line of research has emerged on how to cryptographically protect the integrity of log files even against intruders who gain control of the logging machine. We contribute to this line of research by devising a scheme where one can verify integrity not only of the log file as a whole, but also of excerpts. This is helpful in various scenarios, including cloud provider auditing.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Major revision. CT-RSA 2016
DOI
10.1007/978-3-319-29485-8_11
Keywords
Secure Audit LogsLog FilesExcerptsForward Security
Contact author(s)
gunnar hartung @ kit edu
History
2016-03-15: revised
2016-03-15: received
See all versions
Short URL
https://ia.cr/2016/283
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/283,
      author = {Gunnar Hartung},
      title = {Secure Audit Logs with Verifiable Excerpts},
      howpublished = {Cryptology ePrint Archive, Paper 2016/283},
      year = {2016},
      doi = {10.1007/978-3-319-29485-8_11},
      note = {\url{https://eprint.iacr.org/2016/283}},
      url = {https://eprint.iacr.org/2016/283}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.