A secure logging scheme for Forensic Computing

Nobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Reina Miyaji, Shinichiro Kaneko, Hiroshi Shigeno, Kenichi Okada

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

In this paper, we propose a secure logging scheme for Forensic Computing. Forensic Computing is the process conducted to identify the method of an attack and intruders in the case of system compromise. In Forensic Computing, trustworthy logs admissible for court are needed. Moreover, since the log contains various confidential information, the confidentiality of the log must be preserved. Our scheme achieves the integrity of logs and fine-grained access control for logs with small overhead size using the signature tree and Forward Integrity.

Original languageEnglish
Title of host publicationProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
Pages386-393
Number of pages8
Publication statusPublished - 2004 Dec 1
EventProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC - West Point, NY, United States
Duration: 2004 Jun 102004 Jun 11

Publication series

NameProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC

Other

OtherProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
CountryUnited States
CityWest Point, NY
Period04/6/1004/6/11

Keywords

  • Forensic Computing
  • Logging
  • Signature

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'A secure logging scheme for Forensic Computing'. Together they form a unique fingerprint.

  • Cite this

    Kawaguchi, N., Ueda, S., Obata, N., Miyaji, R., Kaneko, S., Shigeno, H., & Okada, K. (2004). A secure logging scheme for Forensic Computing. In Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC (pp. 386-393). (Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC).