Advances, Systems and Applications
From: Privacy preserving model: a new scheme for auditing cloud stakeholders
Notations | Description |
---|---|
Cm | Check the message used by TPA to examine the correctness of contents stored on a cluster |
Dbi | Blocks of data sent in check-message |
(Fm, Ft) | Fake check message and fake tag generated by CSP if not provided the required service to CU |
(γΦ, β). | Prediction of the malicious attacker against protected data (queries and answers) |
γΦ | Protected data comprising of query and answers |
Z j | The malicious insider entry |
Zj ∉ TI | Unsuccessful attempt |
Z j ∈ T I | Successful attempt |
Δqa = fa(qa) | Response from TPA for malicious insider to authenticate itself |
β = fa(qa) | Successful prediction of malicious insider |
sf | The features of each service assigned to CU |
\( \varpi \)←ℕ | Generation of random number by TSP |
ρ* | Representing the combination of sampled blocks |
ℝg | Random generator of TSP |
∄ ℝm | Impersonated message created by the server |
'O | Output for check-message |
ℵ t | Data tag generated by TPA to validate the CSPs provided services to CU |
| Determining the CSPs illegitimate action |
\( \frac{\mathrm{s}\left(\mathrm{z}\right)}{\mathrm{t}\left(\mathrm{z}\right)} \) | Derivative of two quotients |
∀ ∂ | TPA chooses a random value for checking the CSPs provided service |
ℓ | Set of the features |