Efficient log authentication for Forensic Computing

Nobutaka Kawaguchi, Naohiro Obata, Shintaro Ueda, Yusuke Azuma, Hiroshi Shigeno, Kenichi Okada

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.

Original languageEnglish
Title of host publicationProceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
Pages215-223
Number of pages9
Volume2005
DOIs
Publication statusPublished - 2005
Event6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 - West Point, NY, United States
Duration: 2005 Jun 152005 Jun 17

Other

Other6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
CountryUnited States
CityWest Point, NY
Period05/6/1505/6/17

Fingerprint

Authentication
Servers
Electronic document identification systems
Experiments

Keywords

  • Authentication
  • Forensic Computing
  • Logging

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Kawaguchi, N., Obata, N., Ueda, S., Azuma, Y., Shigeno, H., & Okada, K. (2005). Efficient log authentication for Forensic Computing. In Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 (Vol. 2005, pp. 215-223). [1495955] https://doi.org/10.1109/IAW.2005.1495955

Efficient log authentication for Forensic Computing. / Kawaguchi, Nobutaka; Obata, Naohiro; Ueda, Shintaro; Azuma, Yusuke; Shigeno, Hiroshi; Okada, Kenichi.

Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. Vol. 2005 2005. p. 215-223 1495955.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kawaguchi, N, Obata, N, Ueda, S, Azuma, Y, Shigeno, H & Okada, K 2005, Efficient log authentication for Forensic Computing. in Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. vol. 2005, 1495955, pp. 215-223, 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005, West Point, NY, United States, 05/6/15. https://doi.org/10.1109/IAW.2005.1495955
Kawaguchi N, Obata N, Ueda S, Azuma Y, Shigeno H, Okada K. Efficient log authentication for Forensic Computing. In Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. Vol. 2005. 2005. p. 215-223. 1495955 https://doi.org/10.1109/IAW.2005.1495955
Kawaguchi, Nobutaka ; Obata, Naohiro ; Ueda, Shintaro ; Azuma, Yusuke ; Shigeno, Hiroshi ; Okada, Kenichi. / Efficient log authentication for Forensic Computing. Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. Vol. 2005 2005. pp. 215-223
@inproceedings{720f4c5e043c403aa02e8e6e3d58f66e,
title = "Efficient log authentication for Forensic Computing",
abstract = "In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.",
keywords = "Authentication, Forensic Computing, Logging",
author = "Nobutaka Kawaguchi and Naohiro Obata and Shintaro Ueda and Yusuke Azuma and Hiroshi Shigeno and Kenichi Okada",
year = "2005",
doi = "10.1109/IAW.2005.1495955",
language = "English",
isbn = "0780392906",
volume = "2005",
pages = "215--223",
booktitle = "Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005",

}

TY - GEN

T1 - Efficient log authentication for Forensic Computing

AU - Kawaguchi, Nobutaka

AU - Obata, Naohiro

AU - Ueda, Shintaro

AU - Azuma, Yusuke

AU - Shigeno, Hiroshi

AU - Okada, Kenichi

PY - 2005

Y1 - 2005

N2 - In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.

AB - In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.

KW - Authentication

KW - Forensic Computing

KW - Logging

UR - http://www.scopus.com/inward/record.url?scp=33745455663&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745455663&partnerID=8YFLogxK

U2 - 10.1109/IAW.2005.1495955

DO - 10.1109/IAW.2005.1495955

M3 - Conference contribution

AN - SCOPUS:33745455663

SN - 0780392906

SN - 9780780392908

VL - 2005

SP - 215

EP - 223

BT - Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005

ER -