Skip to main content

Advances, Systems and Applications

Table 2 System Parameters and Definitions for malicious insider and TPA

From: Privacy preserving model: a new scheme for auditing cloud stakeholders

Notations

Description

Qm = (qm, fm)

Query posed by a malicious insider

Qm

Malicious attacker

TI

Bounded time interval

Φ, β).

Prediction of the malicious attacker against protected data (queries and answers)

γΦ

Protected data comprising of query and answers

Z j

The malicious insider entry

Zj TI

Unsuccessful attempt

Z j T I

Successful attempt

Δqa = fa(qa)

Response from TPA for malicious insider to authenticate itself

β = fa(qa)

Successful prediction of malicious insider