Adding Secure Transparency Logging to the PRIME Core

  • Hans Hedbom
  • Tobias Pulls
  • Peter Hjärtquist
  • Andreas Lavén
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 320)


This paper presents a secure privacy preserving log. These types of logs are useful (if not necessary) when constructing transparency services for privacy enhancement. The solution builds on and extends previous work within the area and tries to address the shortcomings of previous solutions regarding privacy issues.


Data Subject Late Entry Hash Chain Private Information Retrieval Prime Core 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Casassa-Mont, M., Crosta, S., Kriegelstein, T., Sommer, D.: Architecture v2. PRIME Deliverable D14.2.c (March 2007)Google Scholar
  2. 2.
    Holt, J.E.: Logcrypt: forward security and public verification for secure audit logs. In: Proceedings of the 2006 Australasian workshops on Grid computing and e-research. ACM International Conference Proceeding Series, vol. 54, 167, pp. 203–211. Australian Computer Society (2006)Google Scholar
  3. 3.
    Ma, D., Tsudik, G.: A new approach to secure logging. ACM Transactions on Storage (TOS) 5(1) (March 2009)Google Scholar
  4. 4.
    Pfitzmann, A., Juschka, A., Stange, A.-K., Steinbrecher, S., Köpsell, S.: Digital Privacy: Theory, Technologies and Practices, ch. 2, pp. 19–47. Auerbach Publications (2008)Google Scholar
  5. 5.
  6. 6.
    PrimeLife Project,
  7. 7.
    Sackmann, S., Strüker, J., Accorsi, R.: Personalization in privacy-aware highly dynamic systems. Communications of the ACM 49(9) (September 2006)Google Scholar
  8. 8.
    Schneier, B., Kelsey, J.: Cryptographic support for secure logs on untrusted machines. In: The Seventh USENIX Security Symposium Proceedings, January 1998, pp. 53–62. USENIX Press (1998)Google Scholar
  9. 9.
    Steel, C., Nagappan, R., Lai, R.: Core Security Patterns: Best Practices and Strategies for J2EE. In: Web Services and Identity Management. Pearson Education Inc., London (2006)Google Scholar
  10. 10.
    Wouters, K., Simoens, K., Lathouwers, D., Preneel, B.: Secure and privacy-friendly logging for egovernment services. In: 3rd International Conference on Availability, Reliability and Security (ARES 2008), Barcelona, Catalonia, ES, pp. 1091–1096. IEEE, Los Alamitos (2008)CrossRefGoogle Scholar

Copyright information

© IFIP 2010

Authors and Affiliations

  • Hans Hedbom
    • 1
  • Tobias Pulls
    • 1
  • Peter Hjärtquist
    • 1
  • Andreas Lavén
    • 1
  1. 1.Department of Computer ScienceKarlstad UniversityKarlstadSweden

Personalised recommendations