{"title":"加密和可搜索网络审计日志的实验","authors":"Bhanu Prakash Gopularam, Sashank Dara, N. Nalini","doi":"10.1109/EITES.2015.13","DOIUrl":null,"url":null,"abstract":"We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.","PeriodicalId":170773,"journal":{"name":"2015 International Conference on Emerging Information Technology and Engineering Solutions","volume":"150 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Experiments in Encrypted and Searchable Network Audit Logs\",\"authors\":\"Bhanu Prakash Gopularam, Sashank Dara, N. Nalini\",\"doi\":\"10.1109/EITES.2015.13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.\",\"PeriodicalId\":170773,\"journal\":{\"name\":\"2015 International Conference on Emerging Information Technology and Engineering Solutions\",\"volume\":\"150 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-02-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Emerging Information Technology and Engineering Solutions\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EITES.2015.13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Emerging Information Technology and Engineering Solutions","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EITES.2015.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Experiments in Encrypted and Searchable Network Audit Logs
We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.