Back to Search Start Over

LAVA: Log Authentication and Verification Algorithm

Authors :
Bajramovic, Edita
Frinken, Marius
Freiling, Felix
Publication Year :
2019

Abstract

Log files provide essential information regarding the actions of processes in critical computer systems. If an attacker modifies log entries, critical digital evidence is lost. Therefore, many algorithms for secure logging have been devised, each achieving different security goals under different assumptions. We analyze these algorithms and identify their essential security features. Within a common system and attacker model, we integrate these algorithms into a single (parameterizable) “meta” algorithm called LAVA that possesses the union of the security features and can be parameterized to yield the set of former algorithms (and many more). Apart from giving insight into general structures of secure logging protocols, we present an abstract efficiency analysis and practical performance measurements of LAVA showing its usefulness.<br />Technical reports / Department Informatik, CS-2019-01

Details

Language :
English
Database :
OpenAIRE
Accession number :
edsair.doi.dedup.....75a631ac304f3e44f629924df8af030a