Efficient log authentication for Forensic Computing

Nobutaka Kawaguchi, Naohiro Obata, Shintaro Ueda, Yusuke Azuma, Hiroshi Shigeno, Kenichi Okada

研究成果: Conference contribution

3 被引用数 (Scopus)

抄録

In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.

本文言語English
ホスト出版物のタイトルProceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
ページ215-223
ページ数9
DOI
出版ステータスPublished - 2005 12 1
イベント6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 - West Point, NY, United States
継続期間: 2005 6 152005 6 17

出版物シリーズ

名前Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
2005

Other

Other6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
CountryUnited States
CityWest Point, NY
Period05/6/1505/6/17

ASJC Scopus subject areas

  • Engineering(all)

フィンガープリント 「Efficient log authentication for Forensic Computing」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル