2019
DOI: 10.1007/s11036-019-01328-1
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-grained Log Auditing Scheme for Cloud Data Confidentiality

Abstract: With increasing number of cloud data leakage accidents exposed, outsourced data control becomes a more and more serious concern of their owner. To relieve the concern of these cloud users, reliable logging schemes are widely used to generate proof for data confidentiality auditing. However, high frequency operation and fine operation granularity on cloud data both result in a considerably large volume of operation logs, which burdens communication and computation in log auditing. This paper proposes a multi-gr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 19 publications
0
1
0
Order By: Relevance
“…Compliance with relevant laws and regulations is essential for mental health organizations to protect patient confidentiality and avoid legal repercussions ( Gooding & Kariotis, 2021 ). Audit logs and monitoring play a crucial role in detecting and responding to potential security breaches ( Yang et al, 2021 ). By monitoring access logs and system activities, organizations can identify suspicious behavior and take prompt action ( Ali, Ahmed & Khan, 2021 ).…”
Section: Discussionmentioning
confidence: 99%
“…Compliance with relevant laws and regulations is essential for mental health organizations to protect patient confidentiality and avoid legal repercussions ( Gooding & Kariotis, 2021 ). Audit logs and monitoring play a crucial role in detecting and responding to potential security breaches ( Yang et al, 2021 ). By monitoring access logs and system activities, organizations can identify suspicious behavior and take prompt action ( Ali, Ahmed & Khan, 2021 ).…”
Section: Discussionmentioning
confidence: 99%
“…Mao et al [ 13 ] proposed a position-aware Merkle tree that can compute the root node without retrieving the whole Merkle tree; in this way, the storage complexity, computation cost, and communication cost will be reduced. Yang et al [ 14 ] propose a multi-grained log auditing scheme to improve the efficiency, which introduces a Merkle Hash Tree structure to support multiple data granularity in logs. Based on the multi-grained log, they present a multi-grained data confidentiality auditing.…”
Section: Related Workmentioning
confidence: 99%