Accountability of Things: Large-Scale Tamper-Evident Logging for Smart Devices

08/10/2023
by   David Koisser, et al.
0

Our modern world relies on a growing number of interconnected and interacting devices, leading to a plethora of logs establishing audit trails for all kinds of events. Simultaneously, logs become increasingly important for forensic investigations, and thus, an adversary will aim to alter logs to avoid culpability, e.g., by compromising devices that generate and store logs. Thus, it is essential to ensure that no one can tamper with any logs without going undetected. However, existing approaches to establish tamper evidence of logs do not scale and cannot protect the increasingly large number of devices found today, as they impose large storage or network overheads. Additionally, most schemes do not provide an efficient mechanism to prove that individual events have been logged to establish accountability when different devices interact. This paper introduces a novel scheme for practical large-scale tamper-evident logging with the help of a trusted third party. To achieve this, we present a new binary hash tree construction designed around timestamps to achieve constant storage overhead with a configured temporal resolution. Additionally, our design enables the efficient construction of shareable proofs, proving that an event was indeed logged. Our evaluation shows that - using practical parameters - our scheme can localize any tampering of logs with a sub-second resolution, with a constant overhead of  8KB per hour per device.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/11/2017

EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

Remote mobile and embedded devices are used to deliver increasingly impa...
research
09/16/2020

Immutable Log Storage as a Service on Private and Public Blockchains

During the normal operation of a Cloud solution, no one pays attention t...
research
09/24/2019

Logzip: Extracting Hidden Structures via Iterative Clustering for Log Compression

System logs record detailed runtime information of software systems and ...
research
09/03/2018

IoTDots: A Digital Forensics Framework for Smart Environments

IoT devices and sensors have been utilized in a cooperative manner to en...
research
01/24/2019

Mokka: RSM for open networks

Mokka is a PC (CAP theorem) consensus algorithm for handling replicated ...
research
05/21/2023

Anomaly Detection Using One-Class SVM for Logs of Juniper Router Devices

The article deals with anomaly detection of Juniper router logs. Abnorma...
research
01/22/2023

VeraSel: Verifiable Random Selection for Mixnets Construction

The security and performance of Mixnets depends on the trustworthiness o...

Please sign up or login with your details

Forgot password? Click here to reset