Esquema de Estruturação SbC-EC para Log Seguro

  • Sérgio Câmara UFRJ / INMETRO
  • Luci Pirmez UFRJ
  • Luiz F. R. C. Carmo UFRJ / INMETRO

Abstract

Secure log schemes ensure detection of possible attacks against audit logs located in devices under an unprotected environment. This paper describes the structure scheme SbC-EC for secure logging, suitable for storage and network communication constrained devices, presenting two new features: Split by Category and Entry Compaction. We also describe the SbC-EC MAC secure log scheme, which implements the new proposed structure along with symmetric cryptography primitives and the FssAgg authentication scheme for protecting the log files. SbC-EC MAC presents a storage gain in comparison to other existing symmetric secure log schemes.

References

Accorsi, R. (2011). BBox: A distributed secure log architecture. In proceedings of the 7th European Workshop on Public Key Infrastructures, Services and Applications, páginas 109–124.

Accorsi, R. (2013). A secure log architecture to support remote auditing. Mathematical and Computer Modelling, 57(7-8):1578–1591.

Bellare, M., Canetti, R., e Krawczyk, H. (1996). Keying hash functions for message authentication. páginas 1–15. Springer-Verlag.

Bellare, M. e Yee, B. (1997). Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, University of California at San Diego.

Bellare, M. e Yee, B. (2003). Forward-security in private-key cryptography. Topics in Cryptology-CT-RSA 2003, páginas 1–24.

Holt, J. E. (2006). Logcrypt: Forward Security and Public Verification for Secure Audit Logs. In Proceedings of the 2006 Australasian Workshops on Grid Computing and eResearch Volume 54, ACSW Frontiers ’06, páginas 203–211, Darlinghurst, Australia, Australia. Australian Computer Society, Inc.

International Electrotechnical Commission (2011). ISA Security for Industrial Automation and Control Systems Technical Security Requirements for IACS Components Part 4.

Ma, D. e Tsudik, G. (2007). Extended Abstract: Forward-Secure Sequential Aggregate Authentication. In Proceedings of the 2007 IEEE Symposium on Security and Privacy, SP ’07, páginas 86–91, Washington, DC, USA. IEEE Computer Society.

Ma, D. e Tsudik, G. (2008). A New Approach to Secure Logging. In Proceeedings of the 22Nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, páginas 48–63, Berlin, Heidelberg. Springer-Verlag.

Ma, D. e Tsudik, G. (2009a). A New Approach to Secure Logging.

Ma, D. I. e Tsudik, G. (2009b). A New Approach to Secure Logging. ACM Transactions on Storage, 5(1):2:1-2:21.

National Institute of Standards and Technology (2001). Announcing the Advanced Encryption Standard (AES).

National Institute of Standards and Technology (2012). FIPS PUB 180-4, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-4. Technical report, Department Of Commerce.

Oprea, A. e Bowers, K. D. (2009). Authentic time-stamps for archival storage. In Proceedings of the 14th European Conference on Research in Computer Security, ESORICS’09, páginas 136–151, Berlin, Heidelberg. Springer-Verlag.

Schneier, B. e Kelsey, J. (1998). Cryptographic Support for Secure Logs on Untrusted Machines. In Proceedings of the 7th Conference on USENIX Security Symposium Volume 7, SSYM’98, página 4, Berkeley, CA, USA. USENIX Association.

Schneier, B. e Kelsey, J. (1999). Secure audit logs to support computer forensics. ACM Transactions on Information and System Security, 2(2):159–176.

Yavuz, A. A. e Ning, P. (2009). BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. In Computer Security Applications Conference, 2009. ACSAC ’09. Annual, number ii, páginas 219–228.

Yavuz, A. a., Ning, P., e Reiter, M. K. (2012). BAF and FI-BAF: Efficient and Publicly Verifiable Cryptographic Schemes for Secure Logging in Resource-Constrained Systems. ACM Transactions on Information and System Security, 15(2):1–28.
Published
2014-11-03
How to Cite
CÂMARA, Sérgio; PIRMEZ, Luci; CARMO, Luiz F. R. C.. Esquema de Estruturação SbC-EC para Log Seguro. Proceedings of the Brazilian Symposium on Information and Computational Systems Security (SBSeg), [S.l.], p. 42-55, nov. 2014. ISSN 0000-0000. Available at: <https://sol.sbc.org.br/index.php/sbseg/article/view/20120>. Date accessed: 17 may 2024. doi: https://doi.org/10.5753/sbseg.2014.20120.

Most read articles by the same author(s)

1 2 > >>