DocumentCode
1707097
Title
Efficient log authentication for forensic computing
Author
Kawaguchi, Nobutaka ; Obata, Naohiro ; Ueda, Shintaro ; Azuma, Yusuke ; Shigeno, Hiroshi ; Okada, Kenichi
Author_Institution
Fac. of Sci. & Technol., Keio Univ., Yokohama, Japan
fYear
2005
Firstpage
215
Lastpage
223
Abstract
In this paper, an efficient log authentication scheme for forensic computing is proposed. To conduct reliable forensic computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, the authors proposed an efficient log authentication scheme for forensic computing. The scheme reduces the traffic of the sign server, which signs the logs of the logging hosts, by using distributed Merkle tree algorithm among the logging hosts. The scheme´s effectiveness was shown through evaluation experiments.
Keywords
computer crime; digital signatures; law administration; trees (mathematics); digital evidence; digital signatures; distributed Merkle tree algorithm; forensic computing; log authentication; logging host; server traffic; Authentication; Computer crime; Computer hacking; Computer networks; Digital signatures; Forensics; Government; Information security; Network servers; Personal communication networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
Print_ISBN
0-7803-9290-6
Type
conf
DOI
10.1109/IAW.2005.1495955
Filename
1495955
Link To Document