[Computer Science] [2019.12] Use the search function to securely store logs remotely

Insert picture description here

This article for the University of Porto, Portugal: Thesis (Author Rui Araújo), a total of 125.

In addition to using cloud-based services, infrastructure, and storage, the use of application logs in business-critical applications is standard practice today. These application logs must be stored in an accessible way so that they can be used when needed. The debugging of these applications is a common situation that requires this access. Generally, some of the information contained in log records is sensitive.

This work proposes a new method of storing critical logs in cloud-based storage, reusing searchable encryption, reverse indexing, and hash linking technologies to achieve the required privacy, integrity, and authenticity in a unified manner While maintaining the server-side search capabilities of the log owner.

The designed search algorithm supports concatenated keyword queries and fine-grained searches supported by field searches and nested queries, which are essential in the cited use cases. As far as we know, the solution proposed in this article is also the first to introduce a query language, which supports complex conjunction keywords and fine-grained searches backed by field searches and sub-queries.

Along side with the use of cloud-based services, infrastructure and storage, the use of application logs in business critical applications is a standard practice nowadays. Such application logs must be stored in an accessible manner in order to used whenever needed. The debugging of these applications is a common situation where such access is required. Frequently, part of the information contained in logs records is sensitive.

This work proposes a new approach of storing critical logs in a cloud-based storage recurring to searchable encryption, inverted indexing and hash chaining techniques to achieve, in a unified way, the needed privacy, integrity and authenticity while maintaining server side searching capabilities by the logs owner.

The designed search algorithm enables conjunctive keywords queries plus a fine-grained search supported by field searching and nested queries, which are essential in the referred use case. To the best of our knowledge, the proposed solution is also the first to introduce a query language that enables complex conjunctive keywords and a fine-grained search backed by field searching and sub queries.

  1.   引言
    
  2. Cryptography and searchable encryption
  3. Related work
  4. Security Log Service
  5. verification
  6. in conclusion

For more exciting articles, please pay attention to the public account:Insert picture description here

Guess you like

Origin blog.csdn.net/weixin_42825609/article/details/113995419