Efficient log authentication for Forensic Computing

Nobutaka Kawaguchi, Naohiro Obata, Shintaro Ueda, Yusuke Azuma, Hiroshi Shigeno, Kenichi Okada

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.

Original languageEnglish
Title of host publicationProceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Pages215-223
Number of pages9
DOIs
Publication statusPublished - 2005 Dec 1
Event6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 - West Point, NY, United States
Duration: 2005 Jun 152005 Jun 17

Publication series

NameProceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Volume2005

Other

Other6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Country/TerritoryUnited States
CityWest Point, NY
Period05/6/1505/6/17

Keywords

  • Authentication
  • Forensic Computing
  • Logging

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Efficient log authentication for Forensic Computing'. Together they form a unique fingerprint.

Cite this