A PKI-based secure audit web service

被引:0
|
作者
Xu, Wensheng [1 ]
Chadwick, David [1 ]
Otenko, Sassa [1 ]
机构
[1] Univ Kent, Comp Lab, Canterbury CT2 7NZ, Kent, England
关键词
secure audit trail; public key cryptography; web service; secure hash; trusted computing base;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For many applications, access control and other business related information of all user transactions should be kept in secure log files for intrusion and misuse detection or system audit purposes. Because the log files may be stored on or moved to an untrusted machine. and may attract attackers because of the large amounts of potentially sensitive information contained in them, we would like to guarantee that in the event an attacker gains access to this machine, we can limit his ability to corrupt the log files and we are able to detect any compromises afterwards. We also may want to ensure that he can gain little or no information from the log files. In this paper we propose a secure audit web service (SAWS) which can provide a secure audit trail service for multiple clients. The secure audit trail generated by SAWS can be stored on any untrusted machine and it is impossible to be modified or destroyed without detection, and its integrity can be validated by any client. Optionally, the audit file can be encrypted, making it impossible for unauthorised parties to read its contents.
引用
收藏
页码:106 / 110
页数:5
相关论文
共 50 条
  • [1] A Forward Secure PKI-based UMTS-AKA with Tunneling Authentication
    Aminmoghadam, Emad
    Mirghadri, Abdolrasol
    2015 THIRD INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION, NETWORKING, AND WIRELESS COMMUNICATIONS (DINWC), 2015, : 55 - 60
  • [2] PKI-Based Cryptography for Secure Cloud Data Storage Using ECC
    Yin, XiaoChun
    Liu, ZengGuang
    Lee, Young Sil
    Lee, Hoon Jae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 194 - 199
  • [3] A static analysis of PKI-based systems
    Aziz, B
    Gray, D
    Hamilton, G
    THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2005, 3701 : 51 - 65
  • [4] A PKI-based lightweight workflow model
    Zhang, J
    Sun, JG
    Li, NY
    Hu, CQ
    Li, ZH
    2005 International Conference on Control and Automation (ICCA), Vols 1 and 2, 2005, : 1062 - 1067
  • [5] A PKI-based end-to-end secure infrastructure for mobile e-commerce
    Cheung, TW
    Chanson, ST
    FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS, 2001, 69 : 421 - 441
  • [6] A Blockchain and PKI-Based Secure Vehicle-to-Vehicle Energy-Trading Protocol
    Hossain, Md Sahabul
    Rodine, Craig
    Tsiropoulou, Eirini Eleni
    ENERGIES, 2024, 17 (17)
  • [7] An open, PKI-based mobile payment system
    Hassinen, Marko
    Hypponen, Konstantin
    Haataja, Keijo
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 86 - 100
  • [8] Design and Implementation of PKI-based Certification Authority
    Zheng Ying
    Bai Qinghai
    Zhao Linna
    Chun Hua
    Chen Jing
    SIXTH INTERNATIONAL CONFERENCE ON ELECTRONICS AND INFORMATION ENGINEERING, 2015, 9794
  • [9] PKI-Based authentication mechanisms in grid systems
    Zhao, Shushan
    Aggarwal, Akshai
    Kent, Robert D.
    INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, PROCEEDINGS, 2007, : 83 - +
  • [10] Design and Implementation of a PKI-Based End-to-End Secure Infrastructure for Mobile E-Commerce
    Chanson S.T.
    Cheung T.-W.
    World Wide Web, 2001, 4 (4) : 235 - 253