skip to main content
10.1145/1821748.1821841acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

Transferring trusted logs across vulnerable paths for digital forensics

Published: 14 December 2009 Publication History

Abstract

In recent years, many accounting scandals have been reported in companies not only in the United States, but also in Japan. The need for Internal Control is thus growing steadily. In particular, auditing logs are important for Internal Control, although without an audit function, any Internal Control is incomplete. The cost of an information system is dependent on the amount of data, which in the case of log data can be very large. We have overcome this problem by developing the Virtual Large-Scale Disk (VLSD) toolkit, which allows us to construct large-scale disks. Using this toolkit, we have implemented log storage with low cost and a long lifetime. However, this log system cannot guarantee the transfer of trusted logs across a vulnerable transfer path, making it unsuitable for Digital Forensics. In this paper, we propose a trusted log transfer method suitable for Digital Forensics. Using this method, it is possible to ascertain whether or not logs have been modified at router nodes.

References

[1]
Minoru Uehara: "A Toolkit for Virtual Large-Scale Storage in a Learning Environment", In Proc. of 21th International Conference on Advanced Information Networking and Applications Workshops/Symposia 2007, Vol. 1, pp. 888--893, (2007.5.23)
[2]
Minoru Uehara: "Security Framework in a Virtual Large-Scale Disk System", In Proc. of IEEE 10th International Workshop on Multimedia Network Systems and Applications (MNSA2008), pp. 30--35, (2008.6.20)
[3]
Akihiro Tomono, Minoru Uehara, Makoto Murakami, Motoi Yamagiwa: "A Log Management System for Internal Control", In Proc. of 2009 International Conference on Network-Based Information Systems(NBiS2009), pp. 432--439, (2009.8.19--21)

Cited By

View all
  • (2021)Zero Trust Security in the Mist ArchitectureComplex, Intelligent and Software Intensive Systems10.1007/978-3-030-79725-6_18(185-194)Online publication date: 30-Jun-2021
  • (2010)A Proposal for Method to Manage License Based on LogProceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops10.1109/WAINA.2010.152(887-892)Online publication date: 20-Apr-2010

Index Terms

  1. Transferring trusted logs across vulnerable paths for digital forensics

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    MoMM '09: Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
    December 2009
    663 pages
    ISBN:9781605586595
    DOI:10.1145/1821748
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • Johannes Kepler University

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 December 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. digital forensics
    2. internal control
    3. log management

    Qualifiers

    • Research-article

    Funding Sources

    • Research of highly reliable and efficient distributed virtual storage based on PC grid

    Conference

    MoMM '09
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Zero Trust Security in the Mist ArchitectureComplex, Intelligent and Software Intensive Systems10.1007/978-3-030-79725-6_18(185-194)Online publication date: 30-Jun-2021
    • (2010)A Proposal for Method to Manage License Based on LogProceedings of the 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops10.1109/WAINA.2010.152(887-892)Online publication date: 20-Apr-2010

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media