Skip to main content

BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems

Publication ,  Journal Article
Yavuz, AA; Ning, P; Reiter, MK
Published in: ACM Transactions on Information and System Security
July 1, 2012

Audit logs are an integral part of modern computer systems due to their forensic value. Protecting audit logs on a physically unprotected machine in hostile environments is a challenging task, especially in the presence of active adversaries. It is critical for such a systemto have forward security and append-only properties such that when an adversary compromises a logging machine, she cannot forge or selectively delete the log entries accumulated before the compromise. Existing public-key-based secure logging schemes are computationally costly. Existing symmetric secure logging schemes are not publicly verifiable and open to certain attacks. In this article, we develop a new forward-secure and aggregate signature scheme called Blind-Aggregate- Forward (BAF), which is suitable for secure logging in resource-constrained systems. BAF is the only cryptographic secure logging scheme that can produce publicly verifiable, forward-secure and aggregate signatures with low computation, key/signature storage, and signature communication overheads for the loggers, without requiring any online trusted third party support. A simple variant of BAF also allows a fine-grained verification of log entries without compromising the security or computational efficiency of BAF. We prove that our schemes are secure in Random Oracle Model (ROM). We also show that they are significantly more efficient than all the previous publicly verifiable cryptographic secure logging schemes. © 2012 ACM.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

ACM Transactions on Information and System Security

DOI

EISSN

1557-7406

ISSN

1094-9224

Publication Date

July 1, 2012

Volume

15

Issue

2

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 4609 Information systems
  • 4604 Cybersecurity and privacy
  • 0806 Information Systems
  • 0804 Data Format
  • 0803 Computer Software
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Yavuz, A. A., Ning, P., & Reiter, M. K. (2012). BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems. ACM Transactions on Information and System Security, 15(2). https://doi.org/10.1145/2240276.2240280
Yavuz, A. A., P. Ning, and M. K. Reiter. “BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems.” ACM Transactions on Information and System Security 15, no. 2 (July 1, 2012). https://doi.org/10.1145/2240276.2240280.
Yavuz AA, Ning P, Reiter MK. BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems. ACM Transactions on Information and System Security. 2012 Jul 1;15(2).
Yavuz, A. A., et al. “BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems.” ACM Transactions on Information and System Security, vol. 15, no. 2, July 2012. Scopus, doi:10.1145/2240276.2240280.
Yavuz AA, Ning P, Reiter MK. BAF and FI-BAF: Efficient and publicly verifiable cryptographic schemes for secure logging in resource-constrained systems. ACM Transactions on Information and System Security. 2012 Jul 1;15(2).

Published In

ACM Transactions on Information and System Security

DOI

EISSN

1557-7406

ISSN

1094-9224

Publication Date

July 1, 2012

Volume

15

Issue

2

Related Subject Headings

  • Strategic, Defence & Security Studies
  • 4609 Information systems
  • 4604 Cybersecurity and privacy
  • 0806 Information Systems
  • 0804 Data Format
  • 0803 Computer Software