Papers
Topics
Authors
Recent
2000 character limit reached

A Secure and Privacy-Friendly Logging Scheme (2405.11341v1)

Published 18 May 2024 in cs.CR and cs.DC

Abstract: Finding a robust security mechanism for audit trail logging has long been a poorly satisfied goal. There are many reasons for this. The most significant of these is that the audit trail is a highly sought after goal of attackers to ensure that they do not get caught. Thus they have an incredibly strong incentive to prevent companies from succeeding in this worthy aim. Regulation, such as the European Union General Data Protection Regulation, has brought a strong incentive for companies to achieve success in this area due to the punitive level of fines that can now be levied in the event of a successful breach by an attacker. We seek to resolve this issue through the use of an encrypted audit trail process that saves encrypted records to a true immutable database, which can ensure audit trail records are permanently retained in encrypted form, with no possibility of the records being compromised. This ensures compliance with the General Data Protection Regulation can be achieved.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (15)
  1. Ponemon Institute, Ed., “2018 Cost of Insider Threats: Global”, April 2018, [Online]. Available: https://153j3ttjub71nfe89mc7r5gb-wpengine.netdna-ssl.com/wp-content/uploads/2018/04/ObserveIT-Insider-Threat-Global-Report-FINAL.pdf [accessed: 2021-04-01]
  2. Microsoft, Ed., “Microsoft Productivity Score”, [Online]. Available: https://adoption.microsoft.com/productivity-score/ [accessed: 2021-04-01]
  3. A. Hern, “Microsoft productivity score feature criticised as workplace surveillance”, The Guardian, [Online]. Available: https://www.theguardian.com/technology/2020/nov/26/microsoft-productivity-score-feature-criticised-workplace-surveillance, 2020-11-26 [accessed: 2021-04-01]
  4. S. Hurtz, “Angestellte überwachen? Microsoft macht’s möglich”, Süddeutsche Zeitung, [Online]. Available: https://sz.de/1.5130228, 2020-11-27 [accessed: 2021-04-01]
  5. Hamburg Commissioner, Ed., “35.3 Million Euro Fine for Data Protection Violations in H&M’s Service Center”, Datenschutz-Hamburg GDPR fine for GDPR employee data breach, Press Release, 2020. [Online]. Available: https://datenschutz-hamburg.de/assets/pdf/2020-10-01-press-release-h+m-fine.pdf [accessed: 2021-04-01]
  6. D. Zimmer, “immudb”, 2021, [Online]. Available: https://www.codenotary.com/technologies/immudb/ [accessed: 2021-03-03]
  7. M. Paik, J. Irazábal, D. Zimmer, M. Meloni, and V. Padurean, “immudb: A Lightweight, Performant Immutable Database”, Available: https://www.codenotary.com/technologies/immudb/ [accessed: 2021-04-01]
  8. B. Schneier and J. Kelsey, “Secure audit logs to support computer forensics”, ACM Transactions on Information and System Security (TISSEC), 2(2), pp. 159-176, 1999.
  9. B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters, “Building an Encrypted and Searchable Audit Log”, NDSS, 4, pp. 5-6, 2004.
  10. A. Shamir, “How to share a secret”, Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
  11. G. R. Blakley, “Safeguarding cryptographic keys”, Managing Requirements Knowledge, International Workshop on (AFIPS), Proceedings, pp. 313-317, 1979.
  12. G. Weir and A. Aßmuth, “Strategies for Intrusion Monitoring in Cloud Services”, pp. 49-53, 2017.
  13. G. Weir, A. Aßmuth, and N. Jäger, “Forensic Recovery and Intrusion Monitoring in the Cloud”, International Journal on Advances in Security, vol. 11, no. 3 & 4, pp. 264-263, 2018.
  14. G. Weir, A. Aßmuth, M. Whittington, and B. Duncan, “Cloud Accounting Systems, the Audit Trail, Forensics and the EU GDPR: How Hard Can It Be?” BAFA Scottish Area Group Annual Conference 2017, Aberdeen, 2017.
  15. H. Krawczyk, “Secret Sharing Made Short”, Advances in Cryptology CRYPTO’ 93, Proceedings, Lecture Notes in Computer Science, vol. 773, pp. 136-146, Springer, 1993.
Citations (3)

Summary

We haven't generated a summary for this paper yet.

Slide Deck Streamline Icon: https://streamlinehq.com

Whiteboard

Dice Question Streamline Icon: https://streamlinehq.com

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Lightbulb Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.