2003 | OriginalPaper | Buchkapitel
Secure Audit Logging with Tamper-Resistant Hardware
verfasst von : Cheun Ngen Chong, Zhonghong Peng, Pieter H. Hartel
Erschienen in: Security and Privacy in the Age of Uncertainty
Verlag: Springer US
Enthalten in: Professional Book Archive
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user’s actions on content and enables detection of some forms of tampering with the logs. We implement the Schneier and Kelsey’s secure audit logging protocol [6], strengthening the protocol by using tamper-resistant hardware (an iButton) in three ways: Firstly, our implementation of the protocol works offline as well as online. Secondly, we use unforgeable timestamps to increase the possibilities of fraud detection. Lastly, we generate the authentication keys, core security of Schneier and Kelsey’s protocol on the iButton to alleviate the possibilities of malicious client generating the bad keys. We provide a performance assessment of our implementation to show under which circumstances the protocol is practical to use.