| ["render:download" not defined] ( PDF | 1MB) |
A secure and auditable logging infrastructure based on a permissioned blockchain
Putz, Benedikt
, Menges, Florian und Pernul, Günther
(2019)
A secure and auditable logging infrastructure based on a permissioned blockchain.
Computers & Security 87.
Veröffentlichungsdatum dieses Volltextes: 06 Sep 2019 09:52
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.40693
Zusammenfassung
Information systems in organizations are regularly subject to cyber attacks targeting confidential data or threatening the availability of the infrastructure. In case of a successful attack it is crucial to maintain integrity of the evidence for later use in court. Existing solutions to preserve integrity of log records remain cost-intensive or hard to implement in practice. In this work we ...
Information systems in organizations are regularly subject to cyber attacks targeting confidential data or threatening the availability of the infrastructure. In case of a successful attack it is crucial to maintain integrity of the evidence for later use in court. Existing solutions to preserve integrity of log records remain cost-intensive or hard to implement in practice. In this work we present a new infrastructure for log integrity preservation which does not depend upon trusted third parties or specialized hardware. The system uses a blockchain to store non-repudiable proofs of existence for all generated log records. An open-source prototype of the resulting log auditing service is developed and deployed, followed by a security and performance evaluation. The infrastructure represents a novel software-based solution to the secure logging problem, which unlike existing approaches does not rely on specialized hardware, trusted third parties or modifications to the logging source. (C) 2019 Elsevier Ltd. All rights reserved.
Alternative Links zum Volltext
["render_heading_insitutions" not defined]
Details
| Dokumentenart | Artikel | ||||
| Titel eines Journals oder einer Zeitschrift | Computers & Security | ||||
| Verlag: | ELSEVIER ADVANCED TECHNOLOGY | ||||
|---|---|---|---|---|---|
| Ort der Veröffentlichung: | OXFORD | ||||
| Band: | 87 | ||||
| Datum | 5 September 2019 | ||||
| Zusätzliche Informationen (Öffentlich) | The accepted manuscript will be available here 24 months after publication (Elsevier embargo). Until then, please retrieve the document from the DOI/ScienceDirect | ||||
| Institutionen | Wirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) Informatik und Data Science > Fachbereich Wirtschaftsinformatik > Lehrstuhl für Wirtschaftsinformatik I - Informationssysteme (Prof. Dr. Günther Pernul) | ||||
| Identifikationsnummer |
| ||||
| Stichwörter / Keywords | ; Log management; Secure logging; Log auditing; Permissioned blockchain; Digital forensics | ||||
| Dewey-Dezimal-Klassifikation | 000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik 300 Sozialwissenschaften > 330 Wirtschaft | ||||
| Status | Veröffentlicht | ||||
| Begutachtet | Ja, diese Version wurde begutachtet | ||||
| An der Universität Regensburg entstanden | Ja | ||||
| URN der UB Regensburg | urn:nbn:de:bvb:355-epub-406937 | ||||
| Dokumenten-ID | 40693 |
Downloadstatistik
Downloadstatistik