TY - GEN
T1 - A secure logging scheme for Forensic Computing
AU - Kawaguchi, Nobutaka
AU - Ueda, Shintaro
AU - Obata, Naohiro
AU - Miyaji, Reina
AU - Kaneko, Shinichiro
AU - Shigeno, Hiroshi
AU - Okada, Kenichi
PY - 2004/12/1
Y1 - 2004/12/1
N2 - In this paper, we propose a secure logging scheme for Forensic Computing. Forensic Computing is the process conducted to identify the method of an attack and intruders in the case of system compromise. In Forensic Computing, trustworthy logs admissible for court are needed. Moreover, since the log contains various confidential information, the confidentiality of the log must be preserved. Our scheme achieves the integrity of logs and fine-grained access control for logs with small overhead size using the signature tree and Forward Integrity.
AB - In this paper, we propose a secure logging scheme for Forensic Computing. Forensic Computing is the process conducted to identify the method of an attack and intruders in the case of system compromise. In Forensic Computing, trustworthy logs admissible for court are needed. Moreover, since the log contains various confidential information, the confidentiality of the log must be preserved. Our scheme achieves the integrity of logs and fine-grained access control for logs with small overhead size using the signature tree and Forward Integrity.
KW - Forensic Computing
KW - Logging
KW - Signature
UR - http://www.scopus.com/inward/record.url?scp=15944391999&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=15944391999&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:15944391999
SN - 0780385721
T3 - Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
SP - 386
EP - 393
BT - Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
T2 - Proceedings fron the Fifth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC
Y2 - 10 June 2004 through 11 June 2004
ER -