Affiliation:
1. Counterpane Systems, Minneapolis, MN
Abstract
In many real-world applications, sensitive information must be kept it log files on an untrusted machine. In the event that an attacker captures this machine, we would like to guarantee that he will gain little or no information from the log files and to limit his ability to corrupt the log files. We describe a computationally cheap method for making all log entries generated prior to the logging machine's compromise impossible for the attacker to read, and also impossible to modify or destroy undetectably.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Cited by
153 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A secure and efficient log storage and query framework based on blockchain;Computer Networks;2024-10
2. Blockchain Based Auditable Access Control for Business Processes With Event Driven Policies;IEEE Transactions on Dependable and Secure Computing;2024-09
3. A Secure and Reliable Blockchain-based Audit Log System;ICC 2024 - IEEE International Conference on Communications;2024-06-09
4. Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
5. Forward Security with Crash Recovery for Secure Logs;ACM Transactions on Privacy and Security;2023-12-12