Notarial timestamps savings in logs management via Merkle trees and Key Derivation Functions

10/05/2021
by   Andrea Barontini, et al.
0

Nowadays log files handling imposes to ISPs (intended in their widest scope) strict normative duties apart from common technological issues. This work analyses how retention time policies and timestamping are deeply interlinked from the point of view of service providers, possibly leading to costs rise. A new schema is proposed trying to mitigate the need for third-party suppliers, enforcing cryptographic primitives well established in other fields of Information Technology but perhaps not yet widespread in logs management. The foundations of timestamping are recapped, and properties of cryptographic primitives introduced as a natural way to bypass legacy schema inefficiency and as an extra level of protection: these choices are justified by savings estimation (with regard to different ISP magnitudes) and by some basic security considerations.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/22/2018

Logchain: Blockchain-assisted Log Storage

During the normal operation of a Cloud solution, no one usually pays att...
research
07/03/2019

Cryptographic One-way Function Based on Boson Sampling

The quest for practical cryptographic primitives that are robust against...
research
06/01/2020

NEMA: Automatic Integration of Large Network Management Databases

Network management, whether for malfunction analysis, failure prediction...
research
04/30/2021

Leveraging Machine Learning to Detect Data Curation Activities

This paper describes a machine learning approach for annotating and anal...
research
10/24/2019

Toward Co-existing Database Schemas based on Bidirectional Transformation

According to strong demands for rapid and reliable software delivery, co...
research
08/16/2020

SoK: Why Johnny Can't Fix PGP Standardization

Pretty Good Privacy (PGP) has long been the primary IETF standard for en...
research
09/25/2017

Deep Learning Based Cryptographic Primitive Classification

Cryptovirological augmentations present an immediate, incomparable threa...

Please sign up or login with your details

Forgot password? Click here to reset