{"title":"利用记录认证器建立高效、可搜索的加密日志","authors":"A. Sabbaghi, F. Mahmoudi","doi":"10.1109/ICCTD.2009.228","DOIUrl":null,"url":null,"abstract":"Audit logs are very important part of any secure system and should be highly considered. The content of them which is past events is so sensitive and poses a threat to privacy and information security, so should be protected against any illegal reading and modification. The best way to do this is encryption. Important challenges in an encrypted audit log are speed of log and search process, correctness and semantic of search results and log size. In this paper a novel algorithm in order to build a secure searchable encrypted audit log by generating a record authenticator is presented. SQL command keywords along with their places, form record authenticator. Our new algorithm brings remarkable advantages such as: fast and high accurate search without decrypting any record, fast logging process, keeping tamper resistance of the log, decreasing log size and improving the correctness of search results by recognizing all irrelevant records in search time.","PeriodicalId":269403,"journal":{"name":"2009 International Conference on Computer Technology and Development","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2009-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Establishing an Efficient and Searchable Encrypted Log Using Record Authenticator\",\"authors\":\"A. Sabbaghi, F. Mahmoudi\",\"doi\":\"10.1109/ICCTD.2009.228\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Audit logs are very important part of any secure system and should be highly considered. The content of them which is past events is so sensitive and poses a threat to privacy and information security, so should be protected against any illegal reading and modification. The best way to do this is encryption. Important challenges in an encrypted audit log are speed of log and search process, correctness and semantic of search results and log size. In this paper a novel algorithm in order to build a secure searchable encrypted audit log by generating a record authenticator is presented. SQL command keywords along with their places, form record authenticator. Our new algorithm brings remarkable advantages such as: fast and high accurate search without decrypting any record, fast logging process, keeping tamper resistance of the log, decreasing log size and improving the correctness of search results by recognizing all irrelevant records in search time.\",\"PeriodicalId\":269403,\"journal\":{\"name\":\"2009 International Conference on Computer Technology and Development\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-11-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 International Conference on Computer Technology and Development\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCTD.2009.228\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Computer Technology and Development","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCTD.2009.228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Establishing an Efficient and Searchable Encrypted Log Using Record Authenticator
Audit logs are very important part of any secure system and should be highly considered. The content of them which is past events is so sensitive and poses a threat to privacy and information security, so should be protected against any illegal reading and modification. The best way to do this is encryption. Important challenges in an encrypted audit log are speed of log and search process, correctness and semantic of search results and log size. In this paper a novel algorithm in order to build a secure searchable encrypted audit log by generating a record authenticator is presented. SQL command keywords along with their places, form record authenticator. Our new algorithm brings remarkable advantages such as: fast and high accurate search without decrypting any record, fast logging process, keeping tamper resistance of the log, decreasing log size and improving the correctness of search results by recognizing all irrelevant records in search time.