Title :
Efficient log authentication for forensic computing
Author :
Kawaguchi, Nobutaka ; Obata, Naohiro ; Ueda, Shintaro ; Azuma, Yusuke ; Shigeno, Hiroshi ; Okada, Kenichi
Author_Institution :
Fac. of Sci. & Technol., Keio Univ., Yokohama, Japan
Abstract :
In this paper, an efficient log authentication scheme for forensic computing is proposed. To conduct reliable forensic computing, it is required that the logs as digital evidences be verified. To verify them, digital signatures issued by authorities are needed. However, if many logging hosts connect to the server that issues the signatures, the traffic of the server will increase. Therefore, the authors proposed an efficient log authentication scheme for forensic computing. The scheme reduces the traffic of the sign server, which signs the logs of the logging hosts, by using distributed Merkle tree algorithm among the logging hosts. The scheme´s effectiveness was shown through evaluation experiments.
Keywords :
computer crime; digital signatures; law administration; trees (mathematics); digital evidence; digital signatures; distributed Merkle tree algorithm; forensic computing; log authentication; logging host; server traffic; Authentication; Computer crime; Computer hacking; Computer networks; Digital signatures; Forensics; Government; Information security; Network servers; Personal communication networks;
Conference_Titel :
Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
Print_ISBN :
0-7803-9290-6
DOI :
10.1109/IAW.2005.1495955