2014
DOI: 10.1109/msp.2013.132
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Security Auditing: Challenges and Emerging Approaches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
15
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 55 publications
(15 citation statements)
references
References 3 publications
0
15
0
Order By: Relevance
“…In Attribute Based Encryption (ABE) system, a user's keys and cipher texts are used for encryption and a particular key can decrypt a particular cipher text. This is done when match between the attributes of the cipher text and the user's key [28,29].…”
Section: Attribute Based Encryption (Abe)mentioning
confidence: 99%
“…In Attribute Based Encryption (ABE) system, a user's keys and cipher texts are used for encryption and a particular key can decrypt a particular cipher text. This is done when match between the attributes of the cipher text and the user's key [28,29].…”
Section: Attribute Based Encryption (Abe)mentioning
confidence: 99%
“…Finally, data on the intrusion model will allow for the formulation of relevant rules for conducting an audit of network security [6]. Moreover, these rules will be updated as data is updated from the honeypot servers.…”
Section: Introductionmentioning
confidence: 99%
“…Virtualization technology has been brought in to optimize utilization of resources for multi-tenant usage model. However, these fundamental properties of cloud computing make cloud-based attacks hard to prevent and crimes difficult to investigate [3]. Virtualization offers advantages and introduces new challenges to the field of digital forensics as well.…”
Section: Introductionmentioning
confidence: 99%