Design and formal verification of a cloud compliant secure logging mechanism

Mehmet Tahir Sandikkaya*, Tolga Ovatman, Ali Emre Harmanci

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

7 Citations (Scopus)

Abstract

Security concerns are still retarding cloud adoption. While the research community work on clearing these concerns, an optimistic fair cloud compliant logging scheme may ease the cloud to spread. This study proposes a secure logging mechanism. The mechanism employs an online bulletin board as a public write-only storage for the log records. The bulletin board also acts as a trusted third party during conflict resolution. The secure logging protocol describes how the log records are distributed to the stakeholders. The protocol's security is verified with model checking tools and no security threats could be found.

Original languageEnglish
Pages (from-to)203-214
Number of pages12
JournalIET Information Security
Volume10
Issue number4
DOIs
Publication statusPublished - 1 Jul 2016

Bibliographical note

Publisher Copyright:
© The Institution of Engineering and Technology 2016.

Fingerprint

Dive into the research topics of 'Design and formal verification of a cloud compliant secure logging mechanism'. Together they form a unique fingerprint.

Cite this