Advances, Systems and Applications
From: Privacy preserving model: a new scheme for auditing cloud stakeholders
Notations | Description |
---|---|
Qm = (qm, fm) | Query posed by a malicious insider |
Qm | Malicious attacker |
TI | Bounded time interval |
(γΦ, β). | Prediction of the malicious attacker against protected data (queries and answers) |
γΦ | Protected data comprising of query and answers |
Z j | The malicious insider entry |
Zj ∉ TI | Unsuccessful attempt |
Z j ∈ T I | Successful attempt |
Δqa = fa(qa) | Response from TPA for malicious insider to authenticate itself |
β = fa(qa) | Successful prediction of malicious insider |