Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Table 2 System Parameters and Definitions for malicious insider and TPA

From: Privacy preserving model: a new scheme for auditing cloud stakeholders

Notations Description
Qm = (qm, fm) Query posed by a malicious insider
Qm Malicious attacker
TI Bounded time interval
Φ, β). Prediction of the malicious attacker against protected data (queries and answers)
γΦ Protected data comprising of query and answers
Z j The malicious insider entry
Zj TI Unsuccessful attempt
Z j T I Successful attempt
Δqa = fa(qa) Response from TPA for malicious insider to authenticate itself
β = fa(qa) Successful prediction of malicious insider