2 research outputs found

    Experiments in Encrypted and Searchable Network Audit Logs

    Get PDF
    We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs

    Experiments in Encrypted and Searchable Network Audit Logs

    No full text
    corecore