{"title":"Establishing an Efficient and Searchable Encrypted Log Using Record Authenticator","authors":"A. Sabbaghi, F. Mahmoudi","doi":"10.1109/ICCTD.2009.228","DOIUrl":null,"url":null,"abstract":"Audit logs are very important part of any secure system and should be highly considered. The content of them which is past events is so sensitive and poses a threat to privacy and information security, so should be protected against any illegal reading and modification. The best way to do this is encryption. Important challenges in an encrypted audit log are speed of log and search process, correctness and semantic of search results and log size. In this paper a novel algorithm in order to build a secure searchable encrypted audit log by generating a record authenticator is presented. SQL command keywords along with their places, form record authenticator. Our new algorithm brings remarkable advantages such as: fast and high accurate search without decrypting any record, fast logging process, keeping tamper resistance of the log, decreasing log size and improving the correctness of search results by recognizing all irrelevant records in search time.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computer Technology and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTD.2009.228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Audit logs are very important part of any secure system and should be highly considered. The content of them which is past events is so sensitive and poses a threat to privacy and information security, so should be protected against any illegal reading and modification. The best way to do this is encryption. Important challenges in an encrypted audit log are speed of log and search process, correctness and semantic of search results and log size. In this paper a novel algorithm in order to build a secure searchable encrypted audit log by generating a record authenticator is presented. SQL command keywords along with their places, form record authenticator. Our new algorithm brings remarkable advantages such as: fast and high accurate search without decrypting any record, fast logging process, keeping tamper resistance of the log, decreasing log size and improving the correctness of search results by recognizing all irrelevant records in search time.