A secure logging scheme for Forensic Computing

Nobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Reina Miyaji, Shinichiro Kaneko, Hiroshi Shigeno, Kenichi Okada

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

In this paper, we propose a secure logging scheme for Forensic Computing. Forensic Computing is the process conducted to identify the method of an attack and intruders in the case of system compromise. In Forensic Computing, trustworthy logs admissible for court are needed. Moreover, since the log contains various confidential information, the confidentiality of the log must be preserved. Our scheme achieves the integrity of logs and fine-grained access control for logs with small overhead size using the signature tree and Forward Integrity.

Original languageEnglish
Title of host publicationProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
Pages386-393
Number of pages8
Publication statusPublished - 2004
EventProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC - West Point, NY, United States
Duration: 2004 Jun 102004 Jun 11

Other

OtherProceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
CountryUnited States
CityWest Point, NY
Period04/6/1004/6/11

Fingerprint

Access control
Trusted computing

Keywords

  • Forensic Computing
  • Logging
  • Signature

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Kawaguchi, N., Ueda, S., Obata, N., Miyaji, R., Kaneko, S., Shigeno, H., & Okada, K. (2004). A secure logging scheme for Forensic Computing. In Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC (pp. 386-393)

A secure logging scheme for Forensic Computing. / Kawaguchi, Nobutaka; Ueda, Shintaro; Obata, Naohiro; Miyaji, Reina; Kaneko, Shinichiro; Shigeno, Hiroshi; Okada, Kenichi.

Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC. 2004. p. 386-393.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kawaguchi, N, Ueda, S, Obata, N, Miyaji, R, Kaneko, S, Shigeno, H & Okada, K 2004, A secure logging scheme for Forensic Computing. in Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC. pp. 386-393, Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC, West Point, NY, United States, 04/6/10.
Kawaguchi N, Ueda S, Obata N, Miyaji R, Kaneko S, Shigeno H et al. A secure logging scheme for Forensic Computing. In Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC. 2004. p. 386-393
Kawaguchi, Nobutaka ; Ueda, Shintaro ; Obata, Naohiro ; Miyaji, Reina ; Kaneko, Shinichiro ; Shigeno, Hiroshi ; Okada, Kenichi. / A secure logging scheme for Forensic Computing. Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC. 2004. pp. 386-393
@inproceedings{d1af6d42bde64f6d9eed3137005b677a,
title = "A secure logging scheme for Forensic Computing",
abstract = "In this paper, we propose a secure logging scheme for Forensic Computing. Forensic Computing is the process conducted to identify the method of an attack and intruders in the case of system compromise. In Forensic Computing, trustworthy logs admissible for court are needed. Moreover, since the log contains various confidential information, the confidentiality of the log must be preserved. Our scheme achieves the integrity of logs and fine-grained access control for logs with small overhead size using the signature tree and Forward Integrity.",
keywords = "Forensic Computing, Logging, Signature",
author = "Nobutaka Kawaguchi and Shintaro Ueda and Naohiro Obata and Reina Miyaji and Shinichiro Kaneko and Hiroshi Shigeno and Kenichi Okada",
year = "2004",
language = "English",
isbn = "0780385721",
pages = "386--393",
booktitle = "Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC",

}

TY - GEN

T1 - A secure logging scheme for Forensic Computing

AU - Kawaguchi, Nobutaka

AU - Ueda, Shintaro

AU - Obata, Naohiro

AU - Miyaji, Reina

AU - Kaneko, Shinichiro

AU - Shigeno, Hiroshi

AU - Okada, Kenichi

PY - 2004

Y1 - 2004

N2 - In this paper, we propose a secure logging scheme for Forensic Computing. Forensic Computing is the process conducted to identify the method of an attack and intruders in the case of system compromise. In Forensic Computing, trustworthy logs admissible for court are needed. Moreover, since the log contains various confidential information, the confidentiality of the log must be preserved. Our scheme achieves the integrity of logs and fine-grained access control for logs with small overhead size using the signature tree and Forward Integrity.

AB - In this paper, we propose a secure logging scheme for Forensic Computing. Forensic Computing is the process conducted to identify the method of an attack and intruders in the case of system compromise. In Forensic Computing, trustworthy logs admissible for court are needed. Moreover, since the log contains various confidential information, the confidentiality of the log must be preserved. Our scheme achieves the integrity of logs and fine-grained access control for logs with small overhead size using the signature tree and Forward Integrity.

KW - Forensic Computing

KW - Logging

KW - Signature

UR - http://www.scopus.com/inward/record.url?scp=15944391999&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=15944391999&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:15944391999

SN - 0780385721

SP - 386

EP - 393

BT - Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC

ER -