Back to Search
Start Over
LAVA: Log Authentication and Verification Algorithm
- Publication Year :
- 2019
-
Abstract
- Log files provide essential information regarding the actions of processes in critical computer systems. If an attacker modifies log entries, critical digital evidence is lost. Therefore, many algorithms for secure logging have been devised, each achieving different security goals under different assumptions. We analyze these algorithms and identify their essential security features. Within a common system and attacker model, we integrate these algorithms into a single (parameterizable) “meta” algorithm called LAVA that possesses the union of the security features and can be parameterized to yield the set of former algorithms (and many more). Apart from giving insight into general structures of secure logging protocols, we present an abstract efficiency analysis and practical performance measurements of LAVA showing its usefulness.<br />Technical reports / Department Informatik, CS-2019-01
- Subjects :
- Department Informatik
ddc:004
004 Datenverarbeitung
Informatik
Subjects
Details
- Language :
- English
- Database :
- OpenAIRE
- Accession number :
- edsair.doi.dedup.....75a631ac304f3e44f629924df8af030a