• DocumentCode
    3735294
  • Title

    Secure logging framework integrating with cloud database

  • Author

    Chung-Yi Lin;Ming-Che Chang;Hua-Chou Chiu;Keh-Hwa Shyu

  • Author_Institution
    Information and Communication Security Laboratory, Chungwa Telecom Laboratories, Taoyuan, Taiwan 32661, ROC
  • fYear
    2015
  • Firstpage
    13
  • Lastpage
    17
  • Abstract
    Trustworthy logging mechanism is crucial to the process of system and application event auditing. Additionally, integrating cloud database in the logging system is a beneficial alternative because it can significantly reduce the cost of database deployment and maintenance. However, a log owner will lose the security control of log data if the data are stored in a cloud database. Attackers could thus use this weakness to falsify log data in a cloud database environment In this paper, we provide a secure logging framework integrating with the cloud database. Log auditors herein can use the public key to validate the integrity of log data. The secret key can be used to generate signatures of log and block data in this framework. We also provide an implementation for this framework and a performance evaluation of signing/verifying log data. Our study demonstrates a method to protect log data for log owners in the cloud database. Furthermore, the proposed secure logging framework can be easily deployed in a cloud computing environment.
  • Keywords
    Databases
  • Publisher
    ieee
  • Conference_Titel
    Security Technology (ICCST), 2015 International Carnahan Conference on
  • Print_ISBN
    978-1-4799-8690-3
  • Electronic_ISBN
    2153-0742
  • Type

    conf

  • DOI
    10.1109/CCST.2015.7389650
  • Filename
    7389650