Abstract
Logging is a central service in computing systems. It lays the foundation for accountability and audit services in computing systems, as well as for other accessory services. While providing logging services in traditional computing systems is a relatively smooth process, it turns to an intricate task in pervasive computing systems. In this context, we present two contributions addressing this problem. First, we develop an approach to securely log information in marginally trusted collectors. Second, we investigate the question of how to securely delegate our logging protocol to a relay equipped with trusted-computing modules.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Autonomic computing initiative (2005), http://www.research.ibm.com/autonomic/
BEEP web site (2005), http://www.beepcore.org
Reliable syslog web site (2005), http://security.sdsc.edu/software/sdsc-syslog/
Syslog-ng web site (2005), http://www.balabit.com/products/syslog_ng
Anderson, R., Kuhn, M.: Tamper resistance: A cautionary note. In: Proceedings of the 2nd USENIX Workshop on Electronic Commerce, pp. 1–11. USENIX Assoc. (1996)
Bellare, M., Yee, B.: Forward integrity for secure audit logs. Technical report, University of California at San Diego, Dept. of Computer Science & Engineering (1997)
Blaß, E.-O., Zitterbart, M.: Towards acceptable public-key encryption in sensor networks. In: Mostéfaoui, S.K., Maamar, Z. (eds.) IWUC, pp. 88–93. INSTICC Press (2005)
Creese, S., Goldsmith, M., Harrison, R., Roscoe, B., Whittaker, P., Zakiuddin, I.: Exploiting empirical engagement in authentication protocol design. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 119–133. Springer, Heidelberg (2005)
Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 116–129. Springer, Heidelberg (2004)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Transactions on Information Theory 2(29), 198–208 (1983)
Flegel, U.: Pseudonymizing unix log files. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol. 2437, pp. 162–179. Springer, Heidelberg (2002)
Forman, G., Zahorjan, J.: The challenges of mobile computing. IEEE Computer 27(4), 38–47 (1994)
Graff, M.G., van Wyk, K.R.: Secure Coding: Principles & Practices. O’Reilly, Sebastopol (2003)
Hohl, A., Lowis, L., Zugenmaier, A.: Look who’s talking – authenticating service access points. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 151–162. Springer, Heidelberg (2005)
Itkis, G.: Cryptographic tamper evidence. In: Proceedings of the Conference on Computer and Communication Security, pp. 355–364. ACM Press, New York (2003)
Kelsey, J., Callas, J.: Signed syslog messages. IETF Internet Draft (2005), http://www.ietf.org/internet-drafts/draft-ietf-syslog-sign-16.txt
Lie, D., Thekkath, C.A., Mitchell, M., Lincoln, P., Boneh, D., Mitchell, J.C., Horowitz, M.: Architectural support for copy and tamper resistant software. In: ASPLOS, pp. 168–177 (2000)
Lonvick, C.: RFC 3164: The BSD syslog protocol. Request for Comments (2001), http://www.ietf.org/rfc/rfc3164.txt
New, D., Rose, M.: RFC 3195: Reliable delivery for syslog. Request for Comments (2001), http://www.ietf.org/rfc/rfc3195.txt
Pfitzmann, B., Riordan, J., Stüble, C., Waidner, M., Weber, A.: Die PERSEUS Systemarchitektur (2001)
Poritz, J., Schunter, M., Herreweghen, E.V., Waidner, M.: Property attestation - scalable and privacy-friendly security assessment of peer computers. Technical Report RZ3548, IBM Corporation (2004)
Sadeghi, A.-R., Stüble, C.: Taming “trusted platforms” by operating system design. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 286–302. Springer, Heidelberg (2004)
Satyanarayanan, M.: Pervasive computing: Vision and challenges. IEEE Personal Communications, 10–17 (2001)
Schneier, B., Kelsey, J.: Remote auditing of software outputs using a trusted coprocessor. Future Generation Computer Systems 13(1), 9–18 (1997)
Schneier, B., Kelsey, J.: Security audit logs to support computer forensics. ACM Transactions on Information and System Security 2(2), 159–176 (1999)
Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002)
Trusted Computing Group. TCG Backgrounder (May 2003)
Wang, J., Yang, Y., Yurcik, W.: Secure smart environments: Security requirements, challenges and experiences in pervasive computing. In: NSF Infrastructure Experience 2005, NSF/CISE/CNS Pervasive Computing Infrastructure Experience Workshop (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Accorsi, R., Hohl, A. (2006). Delegating Secure Logging in Pervasive Computing Systems. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds) Security in Pervasive Computing. SPC 2006. Lecture Notes in Computer Science, vol 3934. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11734666_6
Download citation
DOI: https://doi.org/10.1007/11734666_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-33376-0
Online ISBN: 978-3-540-33377-7
eBook Packages: Computer ScienceComputer Science (R0)