IJERT-EMS
IJERT-EMS

An Encrypted And Searchable Audit Log


An Encrypted And Searchable Audit Log
Authors : Komal D. Kate, P. M. Mane
Publication Date: 07-05-2014

Authors

Author(s):  Komal D. Kate, P. M. Mane

Published in:   International Journal of Engineering Research & Technology

License:  This work is licensed under a Creative Commons Attribution 4.0 International License.

Website: www.ijert.org

Volume/Issue:   Vol. 3 - Issue 5 (May - 2014)

e-ISSN:   2278-0181

Abstract

Audit log is important part of any software system. These audit logs may contain sensitive information, poses a threat to privacy and information security, so should be prohibited against any illegal reading and alteration or deletion. The best way to do this is encryption. The key challenges in an encrypted audit log are speed of log and search process, correctness of query and relevance of search results and log size. We describe an approach for constructing searchable encrypted audit logs which can be combined with any number of existing approaches for creating tamper-resistant logs. Even though previous searchable encryption schemes allow users to search encrypted data by keywords securely, these techniques only support exact keyword search and will fail if there are some spelling errors or if some morphological variants of words are used. In this paper, we provide the solution for fuzzy keyword search over encrypted data. K-grams are used to produce fuzzy results. Our technique for keyword search on encrypted data has wide application beyond searchable audit logs.

Citations

Number of Citations for this article:  Data not Available

Keywords

Key Word(s):    

Downloads

Number of Downloads:     221

Call for Papers - May - 2017

        

 

                 Call for Thesis - 2017 

     Publish your Ph.D/Master's Thesis Online

              Publish Ph.D Master Thesis Online as Book