Efficient log authentication for Forensic Computing

Nobutaka Kawaguchi, Naohiro Obata, Shintaro Ueda, Yusuke Azuma, Hiroshi Shigeno, Kenichi Okada

研究成果: Conference contribution

2 引用 (Scopus)

抄録

In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.

元の言語English
ホスト出版物のタイトルProceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
ページ215-223
ページ数9
2005
DOI
出版物ステータスPublished - 2005
イベント6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 - West Point, NY, United States
継続期間: 2005 6 152005 6 17

Other

Other6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
United States
West Point, NY
期間05/6/1505/6/17

Fingerprint

Authentication
Servers
Electronic document identification systems
Experiments

ASJC Scopus subject areas

  • Engineering(all)

これを引用

Kawaguchi, N., Obata, N., Ueda, S., Azuma, Y., Shigeno, H., & Okada, K. (2005). Efficient log authentication for Forensic Computing. : Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005 (巻 2005, pp. 215-223). [1495955] https://doi.org/10.1109/IAW.2005.1495955

Efficient log authentication for Forensic Computing. / Kawaguchi, Nobutaka; Obata, Naohiro; Ueda, Shintaro; Azuma, Yusuke; Shigeno, Hiroshi; Okada, Kenichi.

Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. 巻 2005 2005. p. 215-223 1495955.

研究成果: Conference contribution

Kawaguchi, N, Obata, N, Ueda, S, Azuma, Y, Shigeno, H & Okada, K 2005, Efficient log authentication for Forensic Computing. : Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. 巻. 2005, 1495955, pp. 215-223, 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005, West Point, NY, United States, 05/6/15. https://doi.org/10.1109/IAW.2005.1495955
Kawaguchi N, Obata N, Ueda S, Azuma Y, Shigeno H, Okada K. Efficient log authentication for Forensic Computing. : Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. 巻 2005. 2005. p. 215-223. 1495955 https://doi.org/10.1109/IAW.2005.1495955
Kawaguchi, Nobutaka ; Obata, Naohiro ; Ueda, Shintaro ; Azuma, Yusuke ; Shigeno, Hiroshi ; Okada, Kenichi. / Efficient log authentication for Forensic Computing. Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005. 巻 2005 2005. pp. 215-223
@inproceedings{720f4c5e043c403aa02e8e6e3d58f66e,
title = "Efficient log authentication for Forensic Computing",
abstract = "In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.",
keywords = "Authentication, Forensic Computing, Logging",
author = "Nobutaka Kawaguchi and Naohiro Obata and Shintaro Ueda and Yusuke Azuma and Hiroshi Shigeno and Kenichi Okada",
year = "2005",
doi = "10.1109/IAW.2005.1495955",
language = "English",
isbn = "0780392906",
volume = "2005",
pages = "215--223",
booktitle = "Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005",

}

TY - GEN

T1 - Efficient log authentication for Forensic Computing

AU - Kawaguchi, Nobutaka

AU - Obata, Naohiro

AU - Ueda, Shintaro

AU - Azuma, Yusuke

AU - Shigeno, Hiroshi

AU - Okada, Kenichi

PY - 2005

Y1 - 2005

N2 - In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.

AB - In this paper, an efficient log authentication scheme for Forensic Computing is proposed. To conduct reliable Forensic Computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, we propose an efficient log authentication scheme for Forensic Computing. Our scheme reduces the traffic of the Sign Server, which signs the logs of the logging hosts, by using distributed Merkle Tree Algorithm among the logging hosts. We show our scheme's effectiveness through evaluation experiments.

KW - Authentication

KW - Forensic Computing

KW - Logging

UR - http://www.scopus.com/inward/record.url?scp=33745455663&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745455663&partnerID=8YFLogxK

U2 - 10.1109/IAW.2005.1495955

DO - 10.1109/IAW.2005.1495955

M3 - Conference contribution

AN - SCOPUS:33745455663

SN - 0780392906

SN - 9780780392908

VL - 2005

SP - 215

EP - 223

BT - Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005

ER -