[Resource Topic] 2016/283: Secure Audit Logs with Verifiable Excerpts

Welcome to the resource topic for 2016/283

Title:
Secure Audit Logs with Verifiable Excerpts

Authors: Gunnar Hartung

Abstract:

Log files are the primary source of information when the past peration of a computing system needs to be determined. Keeping correct and accurate log files is importantfor after-the-fact forensics, as well as for system administration, maintenance, and auditing. Therefore, a line of research has emerged on how to cryptographically protect the integrity of log files even against intruders who gain control of the logging machine. We contribute to this line of research by devising a scheme where one can verify integrity not only of the log file as a whole, but also of excerpts. This is helpful in various scenarios, including cloud provider auditing.

ePrint: https://eprint.iacr.org/2016/283

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .