Skip to main content

Time-scoped searching of encrypted audit logs

Publication ,  Journal Article
Davis, D; Monrose, F; Reiter, MK
Published in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
January 1, 2004

In this paper we explore restricted delegation of searches on encrypted audit logs. We show how to limit the exposure of private information stored in the log during such a search and provide a technique to delegate searches on the log to an investigator. These delegated searches are limited to authorized keywords that pertain to specific time periods, and provide guarantees of completeness to the investigator. Moreover, we show that investigators can efficiently find all relevant records, and can authenticate retrieved records without interacting with the owner of the log. In addition, we provide an empirical evaluation of our techniques using encrypted logs consisting of approximately 27,000 records of IDS alerts collected over a span of a few months. © Springer-Verlag 2004.

Duke Scholars

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2004

Volume

3269

Start / End Page

532 / 545

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Davis, D., Monrose, F., & Reiter, M. K. (2004). Time-scoped searching of encrypted audit logs. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3269, 532–545. https://doi.org/10.1007/978-3-540-30191-2_41
Davis, D., F. Monrose, and M. K. Reiter. “Time-scoped searching of encrypted audit logs.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 3269 (January 1, 2004): 532–45. https://doi.org/10.1007/978-3-540-30191-2_41.
Davis D, Monrose F, Reiter MK. Time-scoped searching of encrypted audit logs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3269:532–45.
Davis, D., et al. “Time-scoped searching of encrypted audit logs.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3269, Jan. 2004, pp. 532–45. Scopus, doi:10.1007/978-3-540-30191-2_41.
Davis D, Monrose F, Reiter MK. Time-scoped searching of encrypted audit logs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2004 Jan 1;3269:532–545.

Published In

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

DOI

EISSN

1611-3349

ISSN

0302-9743

Publication Date

January 1, 2004

Volume

3269

Start / End Page

532 / 545

Related Subject Headings

  • Artificial Intelligence & Image Processing
  • 46 Information and computing sciences