A PKI-based secure audit web service

被引:0
|
作者
Xu, Wensheng [1 ]
Chadwick, David [1 ]
Otenko, Sassa [1 ]
机构
[1] Univ Kent, Comp Lab, Canterbury CT2 7NZ, Kent, England
关键词
secure audit trail; public key cryptography; web service; secure hash; trusted computing base;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For many applications, access control and other business related information of all user transactions should be kept in secure log files for intrusion and misuse detection or system audit purposes. Because the log files may be stored on or moved to an untrusted machine. and may attract attackers because of the large amounts of potentially sensitive information contained in them, we would like to guarantee that in the event an attacker gains access to this machine, we can limit his ability to corrupt the log files and we are able to detect any compromises afterwards. We also may want to ensure that he can gain little or no information from the log files. In this paper we propose a secure audit web service (SAWS) which can provide a secure audit trail service for multiple clients. The secure audit trail generated by SAWS can be stored on any untrusted machine and it is impossible to be modified or destroyed without detection, and its integrity can be validated by any client. Optionally, the audit file can be encrypted, making it impossible for unauthorised parties to read its contents.
引用
收藏
页码:106 / 110
页数:5
相关论文
共 50 条
  • [21] A PKI-based authentication framework next generation mobile Internet
    Gu, J
    Park, S
    Song, O
    Lee, J
    WEB AND COMMUNICATION TECHNOLOGIES AND INTERNET-RELATED SOCIAL ISSUES - HSI 2003, 2003, 2713 : 34 - 43
  • [22] PKI-based security for peer-to-peer information sharing
    Berket, K
    Essiari, A
    Muratas, A
    FOURTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING, PROCEEDINGS, 2004, : 45 - 52
  • [23] Converting PKI-Based Authenticated Key Exchange to Identity-Based
    Suzuki, Koutarou
    Yoneyama, Kazuki
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 159 - 174
  • [24] Research on PKI-Based E-Commerce Security Mechanism
    Geng Li-xiao
    Zeng Zhen-xiang
    Zhang Xue-min
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3545 - 3548
  • [25] Modelling and analysis of PKI-based systems using process calculi
    Aziz, Benjamin
    Hamilton, Geoff
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2007, 18 (03) : 593 - 618
  • [26] PKI-based mutual connections constrained with discrepancy of trust domains
    Zhu, Pengfei
    Dai, Yingxia
    Bao, Xuhua
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2006, 43 (10): : 1804 - 1809
  • [27] Extending BAN Logic for Reasoning with Modern PKI-based Protocols
    Sufatrio
    Yap, Roland H. C.
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 190 - +
  • [28] PKI-based trust management in inter-domain scenarios
    Lopez Millan, Gabriel
    Gil Perez, Manuel
    Martinez Perez, Gregorio
    Gomez Skarmeta, Antonio F.
    COMPUTERS & SECURITY, 2010, 29 (02) : 278 - 290
  • [29] Design on PKI-Based Anonymous Mobile Agent Security in E-Commerce
    MENG Xiangsong
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1907 - 1910
  • [30] Readers Behaving Badly Reader Revocation in PKI-Based RFID Systems
    Nithyanand, Rishab
    Tsudik, Gene
    Uzun, Ersin
    COMPUTER SECURITY-ESORICS 2010, 2010, 6345 : 19 - 36