Third Party Auditing for Service Assurance in Cloud Computing

被引:0
|
作者
Zhang, Yanru [1 ]
Li, Xiang-Yang [2 ]
Han, Zhu [3 ,4 ]
机构
[1] Chinese Univ Hong Kong, Dept Informat Engn, Hong Kong, Hong Kong, Peoples R China
[2] Univ Sci & Technol China, Dept Comp Sci & Technol, Hefei, Anhui, Peoples R China
[3] Univ Houston, Dept Elect & Comp Engn, Houston, TX 77004 USA
[4] Kyung Hee Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
SECURE;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Nowadays, cloud computing has been identified as new opportunities for migrating to the expected agility, reuse, and adaptive capabilities that can support the ever changing IT trends, requirements and environments. However, for benefits of their own, there are various motivations for cloud service providers (CSPs) to behave unfaithfully toward cloud customers, such as invading data privacy and providing inaccurate data processing results to customers. On the other hand, constrained by computation resources and capabilities, customers mostly cannot independently process big data and perform verification on correctness and completeness. Under this information asymmetry, how to ensure the correctness and completeness of data processing, computation, and mining becomes a practically crucial issue that greatly impacts the widely deployment of cloud computing, as well as the future Internet. Though verifiable computing provides us with approaches to verify the computation results. There is hardly an approach that can ensure a 100% detection accuracy. In this paper, the concept of using penalty to decrease CSP's incentive to cheat is proposed from a contract theoretical aspect, where cloud service customers can resort to an external auditor to verify the computation results when needed. Then, an auditing contract which consists of penalty and service fee is proposed so that the CSP will be fined when being found out cheating. Subsequently, the problem is formulated to solve the efficient contract under incomplete information market. Furthermore, we give the simulation results to show the audit contract improve the efficiency of the system.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Effective Third Party Auditing in Cloud Computing
    Hussain, Mohammed
    Al-Mourad, Mohamed Basel
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 91 - 95
  • [2] THIRD-PARTY AUDITING FOR CLOUD SERVICE PROVIDERS IN MULTICLOUD ENVIRONMENT
    Indhumathi, T.
    Aarthy
    Devi, Dhanalakshmi, V
    Samyuktha, V. N.
    [J]. 2017 THIRD INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING & MANAGEMENT (ICONSTEM), 2017, : 347 - 352
  • [3] Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing
    Loheswaran, K.
    Premalatha, J.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 1051 - 1066
  • [4] Renaissance System Model Improving Security and Third Party Auditing in Cloud Computing
    K. Loheswaran
    J. Premalatha
    [J]. Wireless Personal Communications, 2016, 90 : 1051 - 1066
  • [5] Automatic control of the quality of service contract by a third party in the Cloud Computing
    Maarouf, Adil
    Marzouk, Abderrahim
    Haqiq, Abdelkrim
    [J]. 2014 SECOND WORLD CONFERENCE ON COMPLEX SYSTEMS (WCCS), 2014, : 599 - 603
  • [6] Data Security and Privacy Assurance for Cloud Computing in Education Based on a Third Party Auditor
    Alim, Endy Sjaiful
    Jin, Hai
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 96 - 97
  • [7] Third Party Public Auditing scheme for Cloud Storage
    More, Swapnali
    Chaudhari, Sangita
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 69 - 76
  • [8] Utilizing Third Party Auditing to Manage Trust in the Cloud
    Rizvi, Syed
    Karpinski, Kelsey
    Kelly, Brennen
    Walker, Taryn
    [J]. COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 191 - 197
  • [9] Service Level Management (SLM) in Cloud Computing Third party SLM framework
    Motta, Gianmario
    You, Linlin
    Sfondrini, Nicola
    Sacco, Daniele
    Ma, Tianyi
    [J]. 2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 353 - 358
  • [10] A Secure Light-Weight Public Auditing Scheme in Cloud Computing with Potentially Malicious Third Party Auditor
    Wu, Yilun
    Lin, Xinye
    Lu, Xicheng
    Su, Jinshu
    Chen, Peixin
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (10) : 2638 - 2642