Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Steady: A Simple End-to-End Secure Logging System
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).ORCID iD: 0000-0001-6459-8409
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).ORCID iD: 0000-0003-0840-5072
2018 (English)In: Secure IT Systems. NordSec 2018: Lecture Notes in Computer Science, vol 11252 / [ed] N. Gruschka, Springer, 2018, p. 88-103Conference paper, Published paper (Refereed)
Abstract [en]

We present Steady: an end-to-end secure logging system engineered to be simple in terms of design, implementation, and assumptions for real-world use. Steady gets its name from being based on a steady (heart)beat of events from a forward-secure device sent over an untrusted network through untrusted relays to a trusted collector. Properties include optional encryption and compression (with loss of confidentiality but significant gain in goodput), detection of tampering, relays that can function in unidirectional networks (e.g., as part of a data diode), cost-effective use of cloud services for relays, and publicly verifiable proofs of event authenticity. The design is formalized and security proven in the standard model. Our prototype implementation (2,200 loc) shows reliable goodput of over 1M events/s (160 MiB/s) for a realistic dataset with commodity hardware for a device on a GigE network using 16 MiB of memory connected to a relay running at Amazon EC2. 

Place, publisher, year, edition, pages
Springer, 2018. p. 88-103
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 11252
Keywords [en]
Applied cryptography, Protocols, Secure logging, Cost effectiveness, Cryptography, Network protocols, Commodity hardware, Prototype implementations, Publicly verifiable, Secure loggings, The standard model, Untrusted network, Untrusted relays, Network security
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-70592DOI: 10.1007/978-3-030-03638-6_6ISI: 000509939800006Scopus ID: 2-s2.0-85057425500ISBN: 9783030036379 (print)OAI: oai:DiVA.org:kau-70592DiVA, id: diva2:1273090
Conference
Secure IT Systems. NordSec 2018, 28 November 2018 through 30 November 2018
Projects
HITS, 4707
Funder
Knowledge FoundationAvailable from: 2018-12-20 Created: 2018-12-20 Last updated: 2020-09-01Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Pulls, TobiasDahlberg, Rasmus

Search in DiVA

By author/editor
Pulls, TobiasDahlberg, Rasmus
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 293 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf