• May 23, 2018 News!Vol.7, No.2 has been published with online version.   [Click]
  • May 23, 2018 News!Vol.7, No.1 has been published with online version.   [Click]
  • Dec 26, 2017 News![CFP] The annual meeting of IJFCC Editorial Board, ICCTD 2018, will be held in Istanbul, Turkey during March 24-26, 2018.   [Click]
General Information
    • ISSN: 2010-3751
    • Frequency: Bimonthly (2012-2016); Quarterly (Since 2017)
    • DOI: 10.18178/IJFCC
    • Editor-in-Chief: Prof. Mohamed Othman
    • Executive Editor: Ms. Cherry L. Chan
    • Abstracting/ Indexing: Google Scholar,  Crossref, Electronic Journals LibraryEI (INSPEC, IET), etc.
    • E-mail:  ijfcc@ejournal.net 
Editor-in-chief
Prof. Mohamed Othman
Department of Communication Technology and Network Universiti Putra Malaysia, Malaysia
It is my honor to be the editor-in-chief of IJFCC. The journal publishes good papers in the field of future computer and communication. Hopefully, IJFCC will become a recognized journal among the readers in the filed of future computer and communication.
IJFCC 2012 Vol.1(4): 327-329 ISSN: 2010-3751
DOI: 10.7763/IJFCC.2012.V1.88

Ensuring Audit Log Accountability through Hash Based Techniques

Rashmita Jena, M. Aparna, Chinmaya Sahu, Rajeev Ranjan, and Rajesh Atmakuri

Abstract—Audit logs are now considered good practice and a standard approach for business systems. The integrity of the auditing records themselves is critical. By simply storing all the interactions in a separate audit log does not guarantee the integrity of the log. Data tampering can be done through unauthorized access and in some cases through authorized users. Results of such action can be unpleasant for business and their clients. Therefore, a demand for audit log security is needed more than ever. This paper describes a mechanism based on cryptographic hash functions and trusted time stamping that prevents an outsider or inside intruder from silently corrupting the audit log. In addition it is shown that the proposed mechanism can be realized in database systems with little overhead and that the hash based techniques and trusted time stamping can be used efficiently and correctly to determine if the audit log has been compromised.

Index Terms—Audit logs, hashing, database

Rashmita Jena, M. Aparna, Chinmaya Sahu, and Rajeev Ranjan are with the Department of Computer Science National Institute of Science and Technology Palur Hills, Berhampur Orissa, India (e-mail:rashmitaj@nist.edu; maparna@nist.edu; chinmayas@nist.edu; rajeev@nist.edu).
Rajesh Atmakuri is with Wipro InfoTech Electronic city Bangalore Karnataka, India (e-mail: rajesh.atmakuri@wipro.com).

[PDF]

Cite: Rashmita Jena, M. Aparna, Chinmaya Sahu, Rajeev Ranjan, and Rajesh Atmakuri, "Ensuring Audit Log Accountability through Hash Based Techniques," International Journal of Future Computer and Communication vol. 1, no. 4 pp. 327-329, 2012.

Copyright © 2008-2018. International Journal of Future Computer and Communication. All rights reserved.
E-mail: ijfcc@ejournal.net