Authors
Attila Altay Yavuz, Peng Ning
Publication date
2009/12/7
Conference
2009 Annual Computer Security Applications Conference
Pages
219-228
Publisher
IEEE
Description
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on an untrusted machine in a large distributed system is a challenging task, especially in the presence of active adversaries. In such a system, it is critical to have forward security such that when an adversary compromises a machine, she cannot modify or forge the log entries accumulated before the compromise. Unfortunately, existing secure audit logging schemes have significant limitations that make them impractical for real-life applications: existing public key cryptography (PKC) based schemes are computationally expensive for logging in task intensive or resource-constrained systems, while existing symmetric schemes are not publicly verifiable and incur significant storage and communication overheads. In this paper, we propose a …
Total citations
2011201220132014201520162017201820192020202120222023202457139121211971510682
Scholar articles