A Framework for Secure and Verifiable Logging in Public Communication Networks

  • Vassilios Stathopoulos
  • Panayiotis Kotzanikolaou
  • Emmanouil Magkos
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4347)


In this paper we are focusing on secure logging for public network providers. We review existing security threat models against system logging and we extend these to a new threat model especially suited in the environment of telecommunication network providers. We also propose a framework for secure logging in public communication networks as well as realistic implementations designs, which are more resilient to the identified security threats. A key role to the proposed framework is given to an independent Regulatory Authority, which is responsible to verify the integrity of the log files.


Security Measure Threat Model Security Incident Password Management Lawful Interception 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Schneier, B.: Schneier on security: Phone tapping in Greece (2006), web page:
  2. 2.
    Kelsey, J., Callas, J.: Ssyslog-sign protocol. DRAFT, Network Working Group (2002)Google Scholar
  3. 3.
    Dunlap, G.W., King, S.T., Cinar, S., Basrai, M., Chen, P.M.: Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In: Proc. 2002 Symp. Operating Sys. Design and Implementation (2002)Google Scholar
  4. 4.
    Bellare, M., Yee, B.: Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, University of California at San Diego (1997)Google Scholar
  5. 5.
    Schneier, B., Kelsey, J.: Cryptographic support for secure logs on untrusted machines. In: Proceedings of the 7th USENIX Security Symposium, pp. 53–62. USENIX Press (1998)Google Scholar
  6. 6.
    Haber, S., Stornetta, W.: How to time-stamp a digital document. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 437–455. Springer, Heidelberg (1991)Google Scholar
  7. 7.
    Chong, C.N., Peng, Z., Hartel, P.H.: Secure audit logging with tamperresistant hardware. Tech. Rep., Universiteit Twente, Enschede, The Netherlands (2002)Google Scholar
  8. 8.
    Waters, B., Balfanz, D., Durfee, G., Smetters, D.: Building an encrypted and searchable audit log. In: The 11th Annual Network and Distributed System Security Symposium (2004)Google Scholar
  9. 9.
    Accorsi, R.: On the relationship of privacy and secure remote logging in dynamic systems. In: Security and Privacy in Dynamic Environments, vol. 201, pp. 329–338. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  10. 10.
    Holt, J.: Logcrypt: Forward security and public verification for secure audit logs. In: Proc. of Australasian Information Security Workshop (2006)Google Scholar
  11. 11.
    Kawaguchi, N., Obata, N., Ueda, S., Azuma, Y., Shigeno, H., Okada, K.: Efficient log authentication for forensic computing. In: Proc. Of IEEE 6th Information Assurance Workshop, pp. 215–223. IEEE, Los Alamitos (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Vassilios Stathopoulos
    • 1
  • Panayiotis Kotzanikolaou
    • 1
  • Emmanouil Magkos
    • 2
  1. 1.Authority for the Assurance of Communications Security and Privacy (ADAE)MaroussiGreece
  2. 2.Department of InformaticsIonian UniversityPalaia AnaktoraGreece

Personalised recommendations