Pseudonymizing Unix Log Files

  • Ulrich Flegel
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2437)

Abstract

Unix systems in many cases record personal data in log files. We present tools that help in practice to retrofit privacy protection into existing Unix audit systems. Our tools are based on an approach to pseudonymizing Unix log files while balancing user requirements for anonymity and the service provider’s requirements for accountability. By pseudonymizing identifying data in log files the association between the data and the real persons is hidden. Only upon good cause shown, such as a proceeding attack scenario, the identifying data behind the pseudonyms can be revealed. We develop a trust model as well as an architecture that integrates seamlessly with existing Unix systems. Finally, we provide performance measurements demonstrating that the tools are sufficiently fast for use at large sites.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Ulrich Flegel. Pseudonymizing Unix log files. Technical report, Dept. of Computer Science, Chair VI Information Systems and Security, University of Dortmund, D-44221 Dortmund, May 2002. Extended version of this paper. http://ls6-www.cs.uni-dortmund.de/issi/archive/literature/2002/Flegel:2002a.ps.gz.
  2. [2]
    Joachim Biskup and Ulrich Flegel. On pseudonymization of audit data for intrusion detection. In Hannes Federrath, editor, Proceedings of the international Workshop on Design Issues in Anonymity and Unobservability, number 2009 in LNCS, pages 161–180, Berkeley, California, July 2000. ICSI, Springer.Google Scholar
  3. [3]
    Joachim Biskup and Ulrich Flegel. Transaction-based pseudonyms in audit data for privacy respecting intrusion detection. In Hervé Debar, Ludovic Mé, and S. Felix Wu, editors, Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection (RAID 2000), number 1907 in LNCS, pages 28–48, Toulouse, France, October 2000. Springer.Google Scholar
  4. [4]
    Joachim Biskup and Ulrich Flegel. Threshold-based identity recovery for privacy enhanced applications. In Sushil Jajodia and Pierangela Samarati, editors, Proceedings of the 7th ACM Conference on Computer and Communications Security, pages 71–79, Athens, Greece, November 2000. ACM SIGSAC, ACM Press.Google Scholar
  5. [6]
    Louis Harris & Associates Inc. IBM multi-national consumer privacy survey. Technical Report 938568, IBM Global Services, 1999.Google Scholar
  6. [7]
    Jarek Rossignac et al. GVU’s 10thWWW User Survey, December 1998. http://www.cc.gatech.edu/gvu/user surveys/survey-1998-10/graphs/graphs.html#privacy.
  7. [8]
    Steven R. Johnston. The impact of privacy and data protection legislation on the sharing of intrusion detection information. In Lee et al. [28], pages 150–171.Google Scholar
  8. [9]
    National Computer Security Center. US DoD Standard: Department of Defense Trusted Computer System Evaluation Criteria. DOD 5200.28-STD, Supercedes CSC-STD-001-83, dtd 15 Aug 83, Library No. S225,711, December 1985. http://csrc.ncsl.nist.gov/secpubs/rainbow/std001.txt.
  9. [10]
    National Computer Security Center. Audit in trusted systems. NCSC-TG-001, Library No. S-228,470, July 1987. http://csrc.ncsl.nist.gov/secpubs/rainbow/tg001.txt.
  10. [11]
    Common Criteria Implementation Board. Common Criteria for Information Technology Security Evaluation — Part 2: Security functional requirements, Version 2.1. Number CCIMB-99-032. National Institute of Standards and Technology, August 1999. http://csrc.ncsl.nist.gov/cc/ccv20/p2-v21.pdf.
  11. [12]
    C. Lonvick. RFC 3164: The BSD syslog Protocol, August 2001. http://www.ietf.org/rfc/rfc3164.txt.
  12. [14]
    Martin Roesch. Snort-lightweight intrusion detection for networks. In Proceedings of LISA’99: 13th Systems Administration Conference, pages 229–238, Seattle, Washington, November 1999. The Usenix Association, Usenix.Google Scholar
  13. [15]
    Giovanno Vigna, Richard A. Kemmerer, and Per Blix. Designing a web of highly-configurable intrusion detection sensors. In Lee et al. [28], pages 69–84.Google Scholar
  14. [16]
    A. Shamir. How to share a secret. Communications of the ACM, 22:612–613, 1979.MATHCrossRefMathSciNetGoogle Scholar
  15. [18]
    Torbjörn Granlund. The GNU Multiple Precision Arithmetic Library. GNU, 3.1.1 edition, September 2000. http://www.gnu.org/manual/gmp/index.html.
  16. [20]
    Claudia Eckert and Alexander Pircher. Internet anonymity: Problems and solutions. In Michel Dupuy and Pierre Paradinas, editors, Proceedings of the IFIP TC11 16th International Conference on Information Security (IFIP/Sec’01), pages 35–50, Paris, France, June 2001. IFIP, Kluwer Academic Publishers.Google Scholar
  17. [21]
    Simone Fischer-Hübner. IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. Number 1958 in Lecture Notes in Computer Science. Springer, 2001.MATHGoogle Scholar
  18. [22]
    Oliver Berthold, Hannes Federrath, and Marit Köhntopp. Project “Anonymity and unobservability in the internet”. In Proceedings of the Workshop on Freedom and Privacy by Design / Conference on Freedom and Privacy, pages 57–65, Toronto, Canada, April 2000. ACM.Google Scholar
  19. [23]
    Michael Sobirey, Simone Fischer-Hübner, and Kai Rannenberg. Pseudonymous audit for privacy enhanced intrusion detection. In L. Yngström and J. Carlsen, editors, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC’97), pages 151–163, Copenhagen, Denmark, May 1997. IFIP, Chapman & Hall, London.Google Scholar
  20. [24]
    Emilie Lundin and Erland Jonsson. Anomaly-based intrusion detection: privacy concerns and other problems. Computer Networks, 34(4):623–640, October 2000.CrossRefGoogle Scholar
  21. [25]
    Roland Büschkes and Dogan Kesdogan. Privacy enhanced intrusion detection. In Günter Müller and Kai Rannenberg, editors, Multilateral Security in Communications, Information Security, pages 187–204. Addison Wesley, 1999.Google Scholar
  22. [26]
    George Davida, Yair Frankel, Yiannis Tsiounis, and Moti Yung. Anonymity control in e-cashsystems. In R. Hirschfeld, editor, Proceedings of the First International Conference on Financial Cryptography (FC’97), number 1318 in Lecture Notes in Computer Science, pages 1–16, Anguilla, British West Indies, February 1997. Springer.Google Scholar
  23. [27]
    Jaques Traoré. Group signatures and their relevance to privacy-protecting offline electronic cashsystems. In J. Pieprzyk, R. Safavi-Naini, and J. Seberry, editors, Proceedings of the 4th Australasian Conference on Information Security and Privacy (ACISP’99), number 1587 in Lecture Notes in Computer Science, pages 228–243, Wollongong, NSW, Australia, April 1999. Springer.Google Scholar
  24. [28]
    Wenke Lee, Ludovic Mé, and Andreas Wespi, editors. Proceedings of the Fourth International Workshop on Recent Advances in Intrusion Detection (RAID 2001), number 2212 in LNCS, Davis, California, October 2001. Springer.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Ulrich Flegel
    • 1
  1. 1.University of DortmundDortmundGermany

Personalised recommendations