Skip to main content

2016 | OriginalPaper | Buchkapitel

Distributed Immutabilization of Secure Logs

verfasst von : Jordi Cucurull, Jordi Puiggalí

Erschienen in: Security and Trust Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Several applications require robust and tamper-proof logging systems, e.g. electronic voting or bank information systems. At Scytl we use a technology, called immutable logs, that we deploy in our electronic voting solutions. This technology ensures the integrity, authenticity and non-repudiation of the generated logs, thus in case of any event the auditors can use them to investigate the issue. As a security recommendation it is advisable to store and/or replicate the information logged in a location where the logger has no writing or modification permissions. Otherwise, if the logger gets compromised, the data previously generated could be truncated or altered using the same private keys. This approach is costly and does not protect against collusion between the logger and the entities that hold the replicated data. In order to tackle these issues, in this article we present a proposal and implementation to immutabilize integrity proofs of the secure logs within the Bitcoin’s blockchain. Due to the properties of the proposal, the integrity of the immutabilized logs is guaranteed without performing log data replication and even in case the logger gets latterly compromised.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
2
Although it is not enforced by the implementation of Bitcoin, it is recommended by the community not to reuse Bitcoin addresses. Thus, we decided to regenerate the reception address for each transaction generated.
 
Literatur
1.
Zurück zum Zitat Bellare, M., Yee, B.S.: Forward integrity for secure audit logs. Technical report (1997) Bellare, M., Yee, B.S.: Forward integrity for secure audit logs. Technical report (1997)
2.
Zurück zum Zitat Bentov, I., Gabizon, A., Mizrahi, A.: Cryptocurrencies without proof of work. In: Proceedings of 3rd Workshop on Bitcoin and Blockchain Research (2016) Bentov, I., Gabizon, A., Mizrahi, A.: Cryptocurrencies without proof of work. In: Proceedings of 3rd Workshop on Bitcoin and Blockchain Research (2016)
3.
Zurück zum Zitat Colu. Colored Coins Protocol Specification. Accessed June 2016 Colu. Colored Coins Protocol Specification. Accessed June 2016
4.
Zurück zum Zitat Cornet, A.O., Bosch, J.M.B.: Method and system of generating immutable audit logs, 15 January 2009. US Patent App. 12/096,048 Cornet, A.O., Bosch, J.M.B.: Method and system of generating immutable audit logs, 15 January 2009. US Patent App. 12/096,048
5.
Zurück zum Zitat Croman, K., Decker, C., Eyal, I., Gencer, A.E., Juels, A., Kosba, A., Miller, A., Saxena, P., Shi, E., Gün, E.: On scaling decentralized blockchains. In: Proceedings of 3rd Workshop on Bitcoin and Blockchain Research (2016) Croman, K., Decker, C., Eyal, I., Gencer, A.E., Juels, A., Kosba, A., Miller, A., Saxena, P., Shi, E., Gün, E.: On scaling decentralized blockchains. In: Proceedings of 3rd Workshop on Bitcoin and Blockchain Research (2016)
6.
Zurück zum Zitat Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). doi:10.1007/978-3-662-45472-5_28 Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 436–454. Springer, Heidelberg (2014). doi:10.​1007/​978-3-662-45472-5_​28
7.
Zurück zum Zitat Galindo, D., Guasch, S., Puiggalí, J.: 2015 Neuchâtel’s Cast-as-Intended Verification Mechanism. In: Haenni, R., Koenig, R.E., Wikström, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 3–18. Springer, Heidelberg (2015). doi:10.1007/978-3-319-22270-7_1 CrossRef Galindo, D., Guasch, S., Puiggalí, J.: 2015 Neuchâtel’s Cast-as-Intended Verification Mechanism. In: Haenni, R., Koenig, R.E., Wikström, D. (eds.) VOTELID 2015. LNCS, vol. 9269, pp. 3–18. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-22270-7_​1 CrossRef
8.
Zurück zum Zitat BitFury Group, Garzik, J.: Public versus private blockchains. Part 1: permissioned blockchains. Technical report, BitFury Group, October 2015 BitFury Group, Garzik, J.: Public versus private blockchains. Part 1: permissioned blockchains. Technical report, BitFury Group, October 2015
9.
Zurück zum Zitat Karame, G.O., Androulaki, E., Roeschlin, M., Gervais, A., Čapkun, S.: Misbehavior in bitcoin: a study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1), 2: 1–2: 32 (2015)CrossRef Karame, G.O., Androulaki, E., Roeschlin, M., Gervais, A., Čapkun, S.: Misbehavior in bitcoin: a study of double-spending and accountability. ACM Trans. Inf. Syst. Secur. 18(1), 2: 1–2: 32 (2015)CrossRef
10.
Zurück zum Zitat Ma, D., Tsudik, G.: A new approach to secure logging. Trans. Storage 5(1), 2: 1–2: 21 (2009)CrossRef Ma, D., Tsudik, G.: A new approach to secure logging. Trans. Storage 5(1), 2: 1–2: 21 (2009)CrossRef
11.
Zurück zum Zitat Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008) Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)
12.
Zurück zum Zitat National Institute of Standards and Technology. FIPS 198-1, The Keyed-Hash Message Authentication Code (HMAC), Federal Information Processing Standard (FIPS), Publication 198-1. Technical report, U.S. Department of Commerce, July 2008 National Institute of Standards and Technology. FIPS 198-1, The Keyed-Hash Message Authentication Code (HMAC), Federal Information Processing Standard (FIPS), Publication 198-1. Technical report, U.S. Department of Commerce, July 2008
13.
Zurück zum Zitat National Institute of Standards and Technology. FIPS 180-4, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-4. Technical report, U.S. Department of Commerce, March 2012 National Institute of Standards and Technology. FIPS 180-4, Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-4. Technical report, U.S. Department of Commerce, March 2012
14.
Zurück zum Zitat National Institute of Standards and Technology. FIPS 186-4, Digital Signature Standard (DSS), Federal Information Processing Standard (FIPS), Publication 186-4. Technical report, U.S. Department of Commerce, July 2013 National Institute of Standards and Technology. FIPS 186-4, Digital Signature Standard (DSS), Federal Information Processing Standard (FIPS), Publication 186-4. Technical report, U.S. Department of Commerce, July 2013
15.
Zurück zum Zitat Puiggalí, J., Chóliz, J., Guasch, S.: Best practices in internet voting. In: NIST: Workshop on UOCAVA Remote Voting Systems, Washington DC, August 2010 Puiggalí, J., Chóliz, J., Guasch, S.: Best practices in internet voting. In: NIST: Workshop on UOCAVA Remote Voting Systems, Washington DC, August 2010
16.
Zurück zum Zitat Snodgrass, R.T., Yao, S.S., Collberg, C.: Tamper detection in audit logs. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, vol. 30, pp. 504–515. VLDB Endowment (2004) Snodgrass, R.T., Yao, S.S., Collberg, C.: Tamper detection in audit logs. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, vol. 30, pp. 504–515. VLDB Endowment (2004)
17.
Zurück zum Zitat Snow, P., Deery, B., Lu, J., Johnston, D., Kirby, P.: Factom: business processes secured by immutable audit trails on the blockchain. Whitepaper, Factom, November 2014 Snow, P., Deery, B., Lu, J., Johnston, D., Kirby, P.: Factom: business processes secured by immutable audit trails on the blockchain. Whitepaper, Factom, November 2014
18.
Zurück zum Zitat Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE on Security and Privacy Workshops (SPW), pp. 180–184, May 2015 Zyskind, G., Nathan, O., Pentland, A.S.: Decentralizing privacy: using blockchain to protect personal data. In: 2015 IEEE on Security and Privacy Workshops (SPW), pp. 180–184, May 2015
Metadaten
Titel
Distributed Immutabilization of Secure Logs
verfasst von
Jordi Cucurull
Jordi Puiggalí
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-46598-2_9