Secure Audit Logging with Tamper-Resistant Hardware

C.N. Chong, Z. Peng, Z. Peng, Pieter H. Hartel

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    374 Downloads (Pure)


    Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with the logs. We implement Schneier and Kelsey's secure audit logging protocol, strengthening the protocol by using tamper-resistant hardware (an iButton) in two ways: Firstly our implementation of the protocol works offline as well as online. Secondly, we use unforgeable time stamps to increase the possibilities of fraud detection. We provide a performance assessment of our implementation to show under which circumstances the protocol is practical to use.
    Original languageUndefined
    Title of host publication18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC)
    EditorsD. Gritzalis, S. De Capitani di Vimercati, S.K. Katsikas, P. Samarati
    Place of PublicationBoston, Massachusetts
    PublisherKluwer Academic Publishers
    Number of pages12
    ISBN (Print)1-4020-7449-2
    Publication statusPublished - May 2003
    EventIFIP TC11 18th International Conference on Information Security, SEC 2003 - Athens, Greece
    Duration: 26 May 200328 May 2003
    Conference number: 18

    Publication series

    PublisherKluwer Academic Publishers Boston


    OtherIFIP TC11 18th International Conference on Information Security, SEC 2003
    Abbreviated titleSEC


    • EWI-816
    • SCS-Cybersecurity
    • IR-41370
    • METIS-214046

    Cite this