Securing Network Audit Logs on Untrusted Machines

WHAT’S THE PROBLEM?

WHAT’S THE SOLUTION?

MORE INVOLVED STATEMENT OF THE PROBLEM

WHAT WE WANT

APPLICATIONS

LIMITS ON THE USEFUL SOLUTIONS

A Description of Our Method

3. Each log entry contains an element in a hash chain that serves to authenticate the values of the previous log entries.

Protocols in the Paper

Cross Peer Linkages: Building a Hash Lattice

Replacing T with a Network of Insecure Peers

Conclusions

Full paper can be found at: http://www.counterpane.com/secure-logs.html