Time-scoped searching of encrypted audit logs: (Extended abstract)

作者: Michael K. Reiter , Fabian Monrosel , Darren Davisl

DOI:

关键词: AuthenticationComputer scienceAuditEncryptionDatabaseDelegationDelegate

摘要: In this paper we explore restricted delegation of searches on encrypted audit logs. We show how to limit the exposure private infor- mation stored in log during such a search and provide technique delegate an investigator. These delegated are limited authorized keywords that pertain specific time periods, guarantees completeness Moreover, investigators can efficiently find all relevant records, authenticate retrieved records without interacting with owner log. addition, empirical evaluation our techniques using logs consisting approximately 27, 000 IDS alerts collected over span few months.

参考文章(12)
Diana K. Smetters, Brent R. Waters, Dirk Balfanz, Glenn Durfee, Building an Encrypted and Searchable Audit Log. network and distributed system security symposium. ,(2004)
Steven Michael Bellovin, William R. Cheswick, Privacy-Enhanced Searches Using Encrypted Bloom Filters IACR Cryptology ePrint Archive. ,vol. 2004, pp. 22- ,(2007) , 10.7916/D8MK6MR2
Bruce Schneier, John Kelsey, Minimizing Bandwidth for Remote Access to Cryptographically Protected Audit Logs. recent advances in intrusion detection. ,(1999)
Mihir Bellare, Phillip Rogaway, Random oracles are practical: a paradigm for designing efficient protocols computer and communications security. pp. 62- 73 ,(1993) , 10.1145/168588.168596
Bruce Schneier, John Kelsey, Cryptographic support for secure logs on untrusted machines usenix security symposium. pp. 4- 4 ,(1998)
Marco Casassa Mont, Keith Harrison, Martin Sadler, The HP time vault service Proceedings of the twelfth international conference on World Wide Web - WWW '03. pp. 160- 169 ,(2003) , 10.1145/775152.775175
Yan-Cheng Chang, Michael Mitzenmacher, Privacy Preserving Keyword Searches on Remote Encrypted Data Applied Cryptography and Network Security. pp. 442- 455 ,(2005) , 10.1007/11496137_30
Dawn Xiaoding Song, D. Wagner, A. Perrig, Practical techniques for searches on encrypted data ieee symposium on security and privacy. pp. 44- 55 ,(2000) , 10.1109/SECPRI.2000.848445
Shafi Goldwasser, Silvio Micali, Ronald L. Rivest, A digital signature scheme secure against adaptive chosen-message attacks SIAM Journal on Computing. ,vol. 17, pp. 281- 308 ,(1988) , 10.1137/0217017
Dan Boneh, Matt Franklin, Identity-Based Encryption from the Weil Pairing international cryptology conference. pp. 213- 229 ,(2001) , 10.1007/3-540-44647-8_13