• DocumentCode
    1707097
  • Title

    Efficient log authentication for forensic computing

  • Author

    Kawaguchi, Nobutaka ; Obata, Naohiro ; Ueda, Shintaro ; Azuma, Yusuke ; Shigeno, Hiroshi ; Okada, Kenichi

  • Author_Institution
    Fac. of Sci. & Technol., Keio Univ., Yokohama, Japan
  • fYear
    2005
  • Firstpage
    215
  • Lastpage
    223
  • Abstract
    In this paper, an efficient log authentication scheme for forensic computing is proposed. To conduct reliable forensic computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, the authors proposed an efficient log authentication scheme for forensic computing. The scheme reduces the traffic of the sign server, which signs the logs of the logging hosts, by using distributed Merkle tree algorithm among the logging hosts. The scheme´s effectiveness was shown through evaluation experiments.
  • Keywords
    computer crime; digital signatures; law administration; trees (mathematics); digital evidence; digital signatures; distributed Merkle tree algorithm; forensic computing; log authentication; logging host; server traffic; Authentication; Computer crime; Computer hacking; Computer networks; Digital signatures; Forensics; Government; Information security; Network servers; Personal communication networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
  • Print_ISBN
    0-7803-9290-6
  • Type

    conf

  • DOI
    10.1109/IAW.2005.1495955
  • Filename
    1495955