Secure Audit Logging with Tamper-Resistant Hardware

C.N. Chong, Z. Peng, Z. Peng, Pieter H. Hartel

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    307 Downloads (Pure)

    Abstract

    Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user's actions on content and enables detection of some forms of tampering with the logs. We implement Schneier and Kelsey's secure audit logging protocol, strengthening the protocol by using tamper-resistant hardware (an iButton) in two ways: Firstly our implementation of the protocol works offline as well as online. Secondly, we use unforgeable time stamps to increase the possibilities of fraud detection. We provide a performance assessment of our implementation to show under which circumstances the protocol is practical to use.
    Original languageUndefined
    Title of host publication18th IFIP TC11 Int. Conf. on Information Security and Privacy in the Age of Uncertainty (SEC)
    EditorsD. Gritzalis, S. De Capitani di Vimercati, S.K. Katsikas, P. Samarati
    Place of PublicationBoston, Massachusetts
    PublisherKluwer Academic Publishers
    Pages73-84
    Number of pages12
    ISBN (Print)1-4020-7449-2
    Publication statusPublished - May 2003
    EventIFIP TC11 18th International Conference on Information Security, SEC 2003 - Athens, Greece
    Duration: 26 May 200328 May 2003
    Conference number: 18

    Publication series

    Name
    PublisherKluwer Academic Publishers Boston

    Other

    OtherIFIP TC11 18th International Conference on Information Security, SEC 2003
    Abbreviated titleSEC
    Country/TerritoryGreece
    CityAthens
    Period26/05/0328/05/03

    Keywords

    • EWI-816
    • SCS-Cybersecurity
    • IR-41370
    • METIS-214046

    Cite this