IACR News item: 17 December 2014
Bhanu Prakash Gopularam, Sashank Dara, Nalini N
ePrint Report
We consider the scenario where a consumer can securely outsource their network telemetry data to a Cloud Service Provider and enable a third party to audit such telemetry for any security forensics. Especially we consider the use case of privacy preserving search in network log audits. In this paper we experiment with advances in Identity Based Encryption and Attribute-Based encryption schemes for auditing network logs.
Additional news items may be found on the IACR news page.