Nov. 10, 2022, 2:20 a.m. | Mohit Bhasi Thazhath, Jan Michalak, Thang Hoang

cs.CR updates on arXiv.org arxiv.org

The audit log is a crucial component to monitor fine-grained operations over
sensitive data (e.g., personal, health) for security inspection and assurance.
Since such data operations can be highly sensitive, it is vital to ensure that
the audit log achieves not only validity and immutability, but also
confidentiality against active threats to standard data regulations (e.g.,
HIPAA) compliance. Despite its critical needs, state-of-the-art
privacy-preserving audit log schemes (e.g., Ghostor (NSDI '20), Calypso (VLDB
'19)) do not fully obtain a high …

audit data log operations privacy sensitive data

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Security Engineer 2

@ Oracle | BENGALURU, KARNATAKA, India

Oracle EBS DevSecOps Developer

@ Accenture Federal Services | Arlington, VA

Information Security GRC Specialist - Risk Program Lead

@ Western Digital | Irvine, CA, United States

Senior Cyber Operations Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

AI Cybersecurity Architect

@ FactSet | India, Hyderabad, DVS, SEZ-1 – Orion B4; FL 7,8,9,11 (Hyderabad - Divyasree 3)