期刊文献+

基于Hash函数的计算机日志完整性检测模型设计 被引量:1

Computer log integrity detection model based on Hash function design
下载PDF
导出
摘要 计算机日志完整与否关系到取证证据真实与否,针对该问题设计了一个日志完整性检测模型。模型包括两个模块,日志完整性检测模块主要利用哈希函数为计算机系统日志生成一系列日志唯一标识符和其序列号,标识符的特殊关联作用可快速检测出日志是否被篡改,序列号能准确查到日志被篡改位置,同时利用数字签名技术为标识符确认身份,防止其在传送中身份被伪造,引入的可信第三方模块利用可信硬件很好提高了其存储安全性,也保证日志完整性检测离线、断电或被敌手攻击情况下正常工作。安全性分析与性能结果表明,该模型安全可靠,计算复杂度低,尤其对日志数量较大情况下进行检测,其效率较好。 Whether computer log is complete or not matters to whether the forensic evidence is true or not, to solve this prob- lem, a log integrity detection model is designed. The model consists of two modules, log integrity testing module mainly uses a hash function to generate a series of log unique identifier and its serial number for the computer system log. With identifier of the special correlation function, whether the log is tampered or not can be quickly detected, serial number can accurately check the location of tampered log, at the same time, the digital signature technology is used to confirm identities, which prevents the iden- tity from forging in the transmission. Introduced trusted third party modules uses reliable hardware to improve the safety of the storage, and also to guarantee the offline log integrity tests, power outages, and attacked by enemy cases while working normal- ly. Security analysis and performance results show that the model is safe and reliable and has low calculation complexity. For the larger log number cases, its efficiency is better especially.
出处 《计算机工程与设计》 CSCD 北大核心 2014年第3期830-834,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61070219)
关键词 计算机日志 完整性检测模型 可信第三方 哈希函数 唯一标识符 computer logs integrity detection model trusted third party Hash function unique identifier
  • 相关文献

参考文献11

  • 1Judd,Robbins. An explanation of computer forensics[EB/OL].http://www.computerforensics.net/foren sics.htm,2010.
  • 2Kornblum J. Identifying almost identical files using cont ext triggered piecewise hashing[J].DIGITAL INVESTIGATION,2006,(z1):91-97.
  • 3Chen Long,Wang guoyin. An efficient piecewise hashing met hod for computer forensics[A].Adelaide,Aus ralia,2008.635-638.
  • 4Yan Xiangtao,Li Yifa. A wew remote data integrity checking scheme for cloud storage with privacy preserving[A].2012.
  • 5陈龙,王国胤.一种细粒度数据完整性检验方法[J].软件学报,2009,20(4):902-909. 被引量:16
  • 6陈龙,田健.基于Steiner三连系的细粒度数据完整性检验方法[J].重庆邮电大学学报(自然科学版),2011,23(5):631-634. 被引量:2
  • 7赵亚杰,陈龙.面向手机取证的细粒度数据完整性检验方法[J].计算机工程与设计,2012,33(11):4091-4094. 被引量:3
  • 8安玉宝.云存储中数据完整性保护关键技术研究[D]北京:北京邮电大学,201246-47.
  • 9Steel C;吴渝;唐红;陈龙.Windows取证:企业计算机调查指南[M]北京:科学出版社,2007.
  • 10IBM. IBM 4764 PCI-X cryptographic coprocessor[EB/OL].http://www.03.ibm.com/security/cryptocards/pcixcc/overperformance.shtml,2011.

二级参考文献17

  • 1董晓梅,王大玲,于戈,肖珂,杨景辉.电子证据的获取及可靠性关键技术研究[J].计算机科学,2004,31(6):143-145. 被引量:12
  • 2丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 3陈龙,王国胤.计算机取证技术综述[J].重庆邮电学院学报(自然科学版),2005,17(6):736-741. 被引量:48
  • 4JIA Xiao-yun,LUO Shou-shan,YUAN Chao-wei.A New Signature Scheme with Shared Verification[J].The Journal of China Universities of Posts and Telecommunications,2006,13(2):66-69. 被引量:4
  • 5雷小磊,侴万禧.Steiner三连系的构造与计数[J].科技信息,2007(21):177-178. 被引量:1
  • 6Me G, Rossi M. Internal forensic acquisition for mobile equip-ments [C]. IEEE International Symposium on Parallel and Distributed Processing, 2008.
  • 7Wayne Jansen, Rick Ayers. Guidelines on cell phone forensics [EB/OL]. http: //csrc. nist. gov/publications/nistpubs/800- 101/SP800-101. PDF, 2007.
  • 8Paul Owen, Paula Thomas, Duncan Mcphee. An analysis of the digital forensic examination of mobile phones [C]. Inf Security Res Group, Univ of Glamorgan, Pontypridd, UK: Fourth International Conference on Next Generation Mobile Applications, Services and Technologies, 2010: 25-29.
  • 9The Common Digital Evidence Storage Format Working Group. Standardizing digital evidence storage [J]. Communication of the ACM, 2006, 49 (2), 67-68.
  • 10Shira Danker, Rick Ayers, Richard P Mislan. Hashing techniques for mobile device forensics [J]. Small Scale Digital Device ForensicsJournal, 2009, 6 (3): 1-6.

共引文献17

同被引文献9

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部