{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:03:55Z","timestamp":1760234635058,"version":"build-2065373602"},"reference-count":94,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T00:00:00Z","timestamp":1623110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["NORTE-01-0145-FEDER-000044"],"award-info":[{"award-number":["NORTE-01-0145-FEDER-000044"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>Along with the use of cloud-based services, infrastructure, and storage, the use of application logs in business critical applications is a standard practice. Application logs must be stored in an accessible manner in order to be used whenever needed. The debugging of these applications is a common situation where such access is required. Frequently, part of the information contained in logs records is sensitive. In this paper, we evaluate the possibility of storing critical logs in a remote storage while maintaining its confidentiality and server-side search capabilities. To the best of our knowledge, the designed search algorithm is the first to support full Boolean searches combined with field searching and nested queries. We demonstrate its feasibility and timely operation with a prototype implementation that never requires access, by the storage provider, to plain text information. Our solution was able to perform search and decryption operations at a rate of, approximately, 0.05 ms per line. A comparison with the related work allows us to demonstrate its feasibility and conclude that our solution is also the fastest one in indexing operations, the most frequent operations performed.<\/jats:p>","DOI":"10.3390\/jcp1020019","type":"journal-article","created":{"date-parts":[[2021,6,8]],"date-time":"2021-06-08T12:08:55Z","timestamp":1623154135000},"page":"340-364","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Secure Remote Storage of Logs with Search Capabilities"],"prefix":"10.3390","volume":"1","author":[{"given":"Rui","family":"Ara\u00fajo","sequence":"first","affiliation":[{"name":"CIICESI, ESTG, Polit\u00e9cnico do Porto, 4200-465 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5583-5772","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Pinto","sequence":"additional","affiliation":[{"name":"CIICESI, ESTG, Polit\u00e9cnico do Porto and CRACS & INESC TEC, 4200-465 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2021,6,8]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Voigt, P., and Von dem Bussche, A. (2017). The EU General Data Protection Regulation (GDPR). A Practical Guide, Springer International Publishing. [1st ed.].","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref_2","first-page":"18","article-title":"A survey of provably secure searchable encryption","volume":"47","author":"Hartel","year":"2015","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1007\/BF03391580","article-title":"Secure searchable encryption: A survey","volume":"1","author":"Wang","year":"2016","journal-title":"J. Commun. Inf. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1145\/1132956.1132959","article-title":"Inverted files for text search engines","volume":"38","author":"Zobel","year":"2006","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1109\/TSC.2011.24","article-title":"Toward secure and dependable storage services in cloud computing","volume":"5","author":"Wang","year":"2011","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_6","unstructured":"Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., and Shi, H. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Proceedings of the Annual International Cryptology Conference."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"70017","DOI":"10.1109\/ACCESS.2018.2879479","article-title":"A new kind of conditional proxy re-encryption for secure cloud storage","volume":"6","author":"Zeng","year":"2018","journal-title":"IEEE Access"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Manzoor, A., Liyanage, M., Braeke, A., Kanhere, S.S., and Ylianttila, M. (2019, January 14\u201317). Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing. Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Korea.","DOI":"10.1109\/BLOC.2019.8751336"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.jnca.2019.01.003","article-title":"Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage","volume":"129","author":"Lin","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2017.09.032","article-title":"Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system","volume":"424","author":"Wang","year":"2018","journal-title":"Inf. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Mante, R.V., and Bajad, N.R. (2020, January 10\u201312). A Study of Searchable and Auditable Attribute Based Encryption in Cloud. Proceedings of the 2020 5th International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India.","DOI":"10.1109\/ICCES48766.2020.9137860"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"6500","DOI":"10.1109\/TII.2019.2931156","article-title":"An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing","volume":"15","author":"Li","year":"2019","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"978","DOI":"10.1109\/TSC.2017.2762296","article-title":"Searchable encryption for healthcare clouds: A survey","volume":"11","author":"Zhang","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_14","unstructured":"Song, D.X., Wagner, D., and Perrig, A. (2000, January 14\u201317). Practical techniques for searches on encrypted data. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA."},{"key":"ref_15","first-page":"216","article-title":"Secure indexes","volume":"2003","author":"Goh","year":"2003","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Chang, Y.C., and Mitzenmacher, M. (2005). Privacy preserving keyword searches on remote encrypted data. In Proceedings of the International Conference on Applied Cryptography and Network Security, Springer.","DOI":"10.1007\/11496137_30"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"895","DOI":"10.3233\/JCS-2011-0426","article-title":"Searchable symmetric encryption: Improved definitions and efficient constructions","volume":"19","author":"Curtmola","year":"2011","journal-title":"J. Comput. Secur."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Amanatidis, G., Boldyreva, A., and O\u2019Neill, A. (2007, January 8\u201311). Provably-secure schemes for basic query support in outsourced databases. Proceedings of the IFIP Annual Conference on Data and Applications Security and Privacy, Redondo Beach, CA, USA.","DOI":"10.1007\/978-3-540-73538-0_2"},{"key":"ref_19","unstructured":"Van Liesdonk, P., Sedghi, S., Doumen, J., Hartel, P., and Jonker, W. Computationally efficient searchable symmetric encryption. In Proceedings of the Workshop on Secure Data Management."},{"key":"ref_20","unstructured":"Kurosawa, K., and Ohtaki, Y. (March, January 27). UC-secure searchable symmetric encryption. Proceedings of the International Conference on Financial Cryptography and Data Security, Kralendijk, Bonaire, The Netherlands."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., and Roeder, T. (2012, January 16\u201318). Dynamic searchable symmetric encryption. Proceedings of the 2012 ACM Conference on Computer and communications Security, Raleigh, NC, USA.","DOI":"10.1145\/2382196.2382298"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Golle, P., Staddon, J., and Waters, B. (2004, January 8\u201311). Secure conjunctive keyword search over encrypted data. Proceedings of the International Conference on Applied Cryptography and Network Security, Yellow Mountain, China.","DOI":"10.1007\/978-3-540-24852-1_3"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Ballard, L., Kamara, S., and Monrose, F. (2005, January 10\u201314). Achieving efficient conjunctive keyword searches over encrypted data. Proceedings of the International Conference on Information and Communications Security, Beijing, China.","DOI":"10.1007\/11602897_35"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Wang, P., Wang, H., and Pieprzyk, J. (2008, January 2\u20134). Keyword field-free conjunctive keyword searches on encrypted data and extension for dynamic groups. Proceedings of the International Conference on Cryptology and Network Security, Hong Kong, China.","DOI":"10.1007\/978-3-540-89641-8_13"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.C., and Steiner, M. (2013, January 18\u201322). Highly-scalable searchable symmetric encryption with support for boolean queries. Proceedings of the Annual Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Faber, S., Jarecki, S., Krawczyk, H., Nguyen, Q., Rosu, M., and Steiner, M. (2015, January 21\u201325). Rich queries on encrypted data: Beyond exact matches. Proceedings of the European Symposium on Research in Computer Security, Vienna, Austria.","DOI":"10.1007\/978-3-319-24177-7_7"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Park, H.A., Kim, B.H., Lee, D.H., Chung, Y.D., and Zhan, J. (2007, January 2\u20134). Secure similarity search. Proceedings of the 2007 IEEE International Conference on Granular Computing (GRC 2007), Silicon Valley, CA, USA.","DOI":"10.1109\/GRC.2007.4403170"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Shen, E., Shi, E., and Waters, B. (2009, January 15\u201317). Predicate privacy in encryption systems. Proceedings of the Theory of Cryptography Conference, San Francisco, CA, USA.","DOI":"10.1007\/978-3-642-00457-5_27"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"B\u00f6sch, C., Tang, Q., Hartel, P., and Jonker, W. (2012, January 19\u201321). Selective document retrieval from encrypted database. Proceedings of the International Conference on Information Security, Passau, Germany.","DOI":"10.1007\/978-3-642-33383-5_14"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Li, J., Wang, Q., Wang, C., Cao, N., Ren, K., and Lou, W. (2010, January 15\u201319). Fuzzy keyword search over encrypted data in cloud computing. Proceedings of the 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA.","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"ref_31","first-page":"723","article-title":"Efficient multi-user keyword search over encrypted data in cloud computing","volume":"32","author":"Li","year":"2013","journal-title":"Comput. Inform."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Wang, B., Yu, S., Lou, W., and Hou, Y.T. (May, January 27). Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. Proceedings of the IEEE INFOCOM 2014-IEEE Conference on Computer Communications, Toronto, ON, Canada.","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Wang, C., Cao, N., Li, J., Ren, K., and Lou, W. (2010, January 21\u201325). Secure ranked keyword search over encrypted cloud data. Proceedings of the 2010 IEEE 30th International Conference on Distributed Computing Systems, Genova, Italy.","DOI":"10.1109\/ICDCS.2010.34"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","article-title":"Enabling secure and efficient ranked keyword search over outsourced cloud data","volume":"23","author":"Wang","year":"2011","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1109\/TPDS.2013.45","article-title":"Privacy-preserving multi-keyword ranked search over encrypted cloud data","volume":"25","author":"Cao","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Sun, W., Wang, B., Cao, N., Li, M., Lou, W., Hou, Y.T., and Li, H. (2013, January 8\u201310). Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China.","DOI":"10.1145\/2484313.2484322"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"3025","DOI":"10.1109\/TPDS.2013.282","article-title":"Verifiable privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking","volume":"25","author":"Sun","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Khan, N.S., Krishna, C.R., and Khurana, A. (2014, January 26\u201328). Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data. Proceedings of the 2014 International Conference on Computer and Communication Technology (ICCCT), Allahabad, India.","DOI":"10.1109\/ICCCT.2014.7001499"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","article-title":"A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data","volume":"27","author":"Xia","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"951","DOI":"10.1109\/TPDS.2015.2425407","article-title":"An efficient privacy-preserving ranked keyword search method","volume":"27","author":"Chen","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"35826","DOI":"10.1109\/ACCESS.2019.2904763","article-title":"Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data","volume":"7","author":"Guo","year":"2019","journal-title":"IEEE Access"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., and Persiano, G. (2004, January 2\u20136). Public key encryption with keyword search. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland.","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"ref_43","unstructured":"Baek, J., Safavi-Naini, R., and Susilo, W. (July, January 30). Public key encryption with keyword search revisited. Proceedings of the International Conference on Computational Science and Its Applications, Perugia, Italy."},{"key":"ref_44","unstructured":"Bellare, M., Boldyreva, A., and O\u2019Neill, A. (2007, January 19\u201323). Deterministic and efficiently searchable encryption. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA."},{"key":"ref_45","unstructured":"Khader, D. (2007, January 26\u201329). Public key encryption with keyword search based on K-resilient IBE. Proceedings of the International Conference on Computational Science and Its Applications, Kuala Lumpur, Malaysia."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.jss.2009.11.726","article-title":"Trapdoor security in a searchable public-key encryption scheme with a designated tester","volume":"83","author":"Rhee","year":"2010","journal-title":"J. Syst. Softw."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Kohlweiss, M., Rial, A., and Sheedy, C. (2009, January 18\u201320). Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. Proceedings of the International Workshop on Public Key Cryptography, Irvine, CA, USA.","DOI":"10.1007\/978-3-642-00468-1_12"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Liu, Q., Wang, G., and Wu, J. (2009, January 29\u201331). An efficient privacy preserving keyword search scheme in cloud computing. Proceedings of the 2009 International Conference on Computational Science and Engineering, Vancouver, BC, Canada.","DOI":"10.1109\/CSE.2009.66"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Tang, Q., and Chen, L. (2009, January 10\u201311). Public-key encryption with registered keyword search. Proceedings of the European Public Key Infrastructure Workshop, Pisa, Italy.","DOI":"10.1007\/978-3-642-16441-5_11"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Ibraimi, L., Nikova, S., Hartel, P., and Jonker, W. (2011, January 7\u201310). Public-key encryption with delegated search. Proceedings of the International Conference on Applied Cryptography and Network Security, Nerja, Spain.","DOI":"10.1007\/978-3-642-21554-4_31"},{"key":"ref_51","unstructured":"Park, D.J., Kim, K., and Lee, P.J. (2004, January 23\u201325). Public key encryption with conjunctive field keyword search. Proceedings of the International Workshop on Information Security Applications, Jeju Island, Korea."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Hwang, Y.H., and Lee, P.J. (2007, January 2\u20134). Public key encryption with conjunctive keyword search and its extension to a multi-user system. Proceedings of the International Conference on Pairing-Based Cryptography, Tokyo, Japan.","DOI":"10.1007\/978-3-540-73489-5_2"},{"key":"ref_53","unstructured":"Boneh, D., and Waters, B. (2007, January 21\u201324). Conjunctive, subset, and range queries on encrypted data. Proceedings of the Theory of Cryptography Conference, Amsterdam, The Netherlands."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Sedghi, S., Van Liesdonk, P., Nikova, S., Hartel, P., and Jonker, W. (2010, January 13\u201315). Searching keywords with wildcards on encrypted data. Proceedings of the International Conference on Security and Cryptography for Networks, Amalfi, Italy.","DOI":"10.1007\/978-3-642-15317-4_10"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1109\/TSC.2017.2714669","article-title":"Flexible wildcard searchable encryption system","volume":"13","author":"Yang","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., and Kindarji, B. (2009, January 14\u201318). Error-tolerant searchable encryption. Proceedings of the 2009 IEEE International Conference on Communications, Dresden, Germany.","DOI":"10.1109\/ICC.2009.5199004"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1109\/TC.2012.215","article-title":"Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack","volume":"62","author":"Xu","year":"2012","journal-title":"IEEE Trans. Comput."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","article-title":"Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement","volume":"11","author":"Fu","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"164544","DOI":"10.1109\/ACCESS.2019.2952163","article-title":"Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage","volume":"7","author":"Yao","year":"2019","journal-title":"IEEE Access"},{"key":"ref_60","unstructured":"Zeng, M., Qian, H.F., Chen, J., and Zhang, K. (2019). Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage. IEEE Trans. Cloud Comput."},{"key":"ref_61","unstructured":"Bellare, M., and Yee, B. (1997). Forward Integrity for Secure Audit Logs, Computer Science and Engineering Department, University of California. Technical Report."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1145\/317087.317089","article-title":"Secure audit logs to support computer forensics","volume":"2","author":"Schneier","year":"1999","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Hu, Y.C., Jakobsson, M., and Perrig, A. (2005, January 7\u201310). Efficient constructions for one-way hash chains. Proceedings of the International Conference on Applied Cryptography and Network Security, New York, NY, USA.","DOI":"10.1007\/11496137_29"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1504\/IJSN.2006.010822","article-title":"A survey of key evolving cryptosystems","volume":"1","author":"Franklin","year":"2006","journal-title":"Int. J. Secur. Netw."},{"key":"ref_65","unstructured":"Forte, D.V., Maruti, C., Vetturi, M.R., and Zambelli, M. (2005, January 7\u20139). SecSyslog: An approach to secure logging based on covert channels. Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering, Taipei, Taiwan."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Gerhards, R. (2009). RFC 5424: The syslog protocol. Request for Comments, IETF.","DOI":"10.17487\/rfc5424"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Rivest, R.L. (1992). The MD5 Message-Digest Algorithm, RFC. RFC 1321.","DOI":"10.17487\/rfc1321"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Eastlake 3rd., D., and Jones, P. (2001). US Secure Hash Algorithm 1 (SHA1), RFC. RFC 3174.","DOI":"10.17487\/rfc3174"},{"key":"ref_69","unstructured":"Holt, J.E. (2006, January 16\u201319). Logcrypt: Forward security and public verification for secure audit logs. Proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006), Hobart, Australia."},{"key":"ref_70","unstructured":"Shamir, A. (1984, January 19\u201322). Identity-based cryptosystems and signature schemes. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques, Santa Barbara, CA, USA."},{"key":"ref_71","first-page":"2","article-title":"A new approach to secure logging","volume":"5","author":"Ma","year":"2009","journal-title":"ACM Trans. Storage (TOS)"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Ma, D. (2008, January 18\u201320). Practical forward secure sequential aggregate signatures. Proceedings of the 2008 ACM Symposium on INFORMATION, Computer and Communications Security, Tokyo, Japan.","DOI":"10.1145\/1368310.1368361"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/JSYST.2012.2221958","article-title":"Secure logging as a service\u2014Delegating log management to the cloud","volume":"7","author":"Ray","year":"2013","journal-title":"IEEE Syst. J."},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., and Yung, M. (1995, January 27\u201331). Proactive secret sharing or: How to cope with perpetual leakage. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-44750-4_27"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Diffie, W., and Hellman, M.E. (1976, January 7\u201310). Multiuser cryptographic techniques. Proceedings of the National Computer Conference and Exposition, New York, NY, USA.","DOI":"10.1145\/1499799.1499815"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Dutta, A.K., and Hasan, R. (2013, January 8\u201310). SecLaaS: Secure logging-as-a-service for cloud forensics. Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China.","DOI":"10.1145\/2484313.2484342"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/TDSC.2015.2482484","article-title":"Towards building forensics enabled cloud through secure logging-as-a-service","volume":"13","author":"Zawoad","year":"2016","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_78","unstructured":"Benaloh, J., and De Mare, M. (1993, January 23\u201327). One-way accumulators: A decentralized alternative to digital signatures. Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway."},{"key":"ref_79","first-page":"5","article-title":"Building an Encrypted and Searchable Audit Log","volume":"4","author":"Waters","year":"2004","journal-title":"NDSS"},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Franklin, M. (2001, January 19\u201323). Identity-based encryption from the Weil pairing. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Ohtaki, Y. (2005, January 23\u201325). Constructing a searchable encrypted log using encrypted inverted indexes. Proceedings of the International Conference on Cyberworlds, Singapore.","DOI":"10.1109\/CW.2005.33"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Ohtaki, Y. (2008, January 4\u20137). Partial disclosure of searchable encrypted data with support for boolean queries. Proceedings of the ARES 08, Third International Conference on Availability, Reliability and Security, Barcelona, Spain.","DOI":"10.1109\/ARES.2008.80"},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Sabbaghi, A., and Mahmoudi, F. (2009, January 13\u201315). Establishing an Efficient and Searchable Encrypted Log Using Record Authenticator. Proceedings of the ICCTD\u201909, International Conference on Computer Technology and Development, Kota Kinabalu, Malaysia.","DOI":"10.1109\/ICCTD.2009.228"},{"key":"ref_84","unstructured":"Accorsi, R. (2006, January 22\u201324). On the relationship of privacy and secure remote logging in dynamic systems. Proceedings of the IFIP International Information Security Conference, Karlstad, Sweden."},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Accorsi, R., and Hohl, A. (2006, January 18\u201321). Delegating secure logging in pervasive computing systems. Proceedings of the International Conference on Security in Pervasive Computing, York, UK.","DOI":"10.1007\/11734666_6"},{"key":"ref_86","unstructured":"Accorsi, R. (2010, January 23\u201324). BBox: A distributed secure log architecture. Proceedings of the European Public Key Infrastructure Workshop, Athens, Greece."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Savade, L.C., and Chavan, S. (2012, January 5\u20137). A technique to search log records using system of linear equations. Proceedings of the 2012 CSI Sixth International Conference on Software Engineering (CONSEG), Indore, India.","DOI":"10.1109\/CONSEG.2012.6349471"},{"key":"ref_88","unstructured":"Sabes, P.N. (2020, November 15). Linear Algebraic Equations, SVD, and the Pseudo-Inverse. Available online: https:\/\/www.researchgate.net\/profile\/Philip-Sabes\/publication\/228944317_Linear_algebraic_equations_svd_and_the_pseudo-inverse\/links\/584fa4e108ae4bc8993b2f47\/Linear-algebraic-equations-svd-and-the-pseudo-inverse.pdf."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Zhao, W., Qiang, L., Zou, H., Zhang, A., and Li, J. (2018, January 22\u201324). Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage. Proceedings of the 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)\/4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Shanghai, China.","DOI":"10.1109\/CSCloud\/EdgeCom.2018.00015"},{"key":"ref_90","unstructured":"Dworkin, M.J. (2021, May 20). Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC. NIST Special Publication 800-38D, Available online: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-38d\/final."},{"key":"ref_91","unstructured":"Dang, Q.H. (2021, May 20). Secure Hash Standard. FIPS PUB 180-4, Available online: https:\/\/nvlpubs.nist.gov\/nistpubs\/FIPS\/NIST.FIPS.180-4.pdf."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public-key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Commun. ACM"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Zhang, J. (2015, January 10\u201312). Semantic-based searchable encryption in cloud: Issues and challenges. Proceedings of the 2015 First International Conference on Computational Intelligence Theory, Systems and Applications (CCITSA), Ilan, Taiwan.","DOI":"10.1109\/CCITSA.2015.29"},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Byun, J.W., Rhee, H.S., Park, H.A., and Lee, D.H. (2006, January 10\u201311). Off-line keyword guessing attacks on recent keyword search schemes over encrypted data. Proceedings of the Workshop on Secure Data Management, Seoul, Korea.","DOI":"10.1007\/11844662_6"}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/2\/19\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T06:12:09Z","timestamp":1760163129000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/1\/2\/19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,8]]},"references-count":94,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,6]]}},"alternative-id":["jcp1020019"],"URL":"https:\/\/doi.org\/10.3390\/jcp1020019","relation":{},"ISSN":["2624-800X"],"issn-type":[{"type":"electronic","value":"2624-800X"}],"subject":[],"published":{"date-parts":[[2021,6,8]]}}}