{"title":"Application of distributed safe log management in Small-Scale, High-Risk system","authors":"Yuchao Chen, Weiming Wang, M. Gao","doi":"10.1109/IIT.2009.5413751","DOIUrl":null,"url":null,"abstract":"We described an implementation of log managing structure to store log in a Small-Scale, High-Risk distributed environment, which protects the integrity for log even some of storage nodes fail and guarantees the security in the case of secret log divulgence, meanwhile will not cause large space consumption. After collecting log from agents, Collect Center disperses log into pieces using Rabin's Information Dispersal Algorithm (IDA), builds Distributed Fingerprint (DFP) for integrity check. Integrity though the structure gets, it is still not safe enough to avoid the divulgence of secret log in the process of log dispersal and retrieval, some cryptography technology is applied into the log management.","PeriodicalId":239829,"journal":{"name":"2009 International Conference on Innovations in Information Technology (IIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Innovations in Information Technology (IIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IIT.2009.5413751","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We described an implementation of log managing structure to store log in a Small-Scale, High-Risk distributed environment, which protects the integrity for log even some of storage nodes fail and guarantees the security in the case of secret log divulgence, meanwhile will not cause large space consumption. After collecting log from agents, Collect Center disperses log into pieces using Rabin's Information Dispersal Algorithm (IDA), builds Distributed Fingerprint (DFP) for integrity check. Integrity though the structure gets, it is still not safe enough to avoid the divulgence of secret log in the process of log dispersal and retrieval, some cryptography technology is applied into the log management.