Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment

被引:0
|
作者
Wu, Songyang [1 ]
Song, Lipeng [2 ]
机构
[1] Minist Publ Secur, Res Inst 3, Shanghai 201204, Peoples R China
[2] Shandong Univ, Sch Mech Elect & Informat Engn, Weihai 264209, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2023年 / 17卷 / 01期
基金
中国国家自然科学基金;
关键词
Games; Costs; Security; Analytical models; Nash equilibrium; Cloud computing; Numerical models; Cloud storage; competition; data replication auditing; game model; reputation; security commitment; PROVABLE DATA POSSESSION; STORAGE; SCHEME;
D O I
10.1109/JSYST.2022.3190428
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Auditing a cloud service provider's (CSP's) compliance with data backup requirements is of great value to data availability and redundancy. As the checking incurs extra costs, a lot of research has been done to find the optimal checking strategy. However, there remain two problems: 1) What kind of influence does the competition between CSPs for clients have on the checking strategies? 2) How to incorporate the influence of CSP's reputation in a reasonable and practicable way? To solve these problems, we propose a one-population evolutionary game model. The competition for clients is first captured via the game between CSPs. Then, we introduce a reputation term in the game model, which is defined as the function of checking probability. We analyze the model, and then, derive the thresholds of checking probability. A verifier can optimize the use of checking resources whatever checking methods are using according to the thresholds. Finally, we conduct various comparison experiments between our model and another game-based model. The comparison results show that the long-term effects of competition and reputation can help a verifier save checking resources or promote the checking effect.
引用
收藏
页码:306 / 313
页数:8
相关论文
共 39 条
  • [1] Mutual Auditing Framework for Service Level Security Auditing in Cloud
    Sasmal, Soumitra
    Pan, Indrajit
    2017 THIRD IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (ICRCICN), 2017, : 297 - 302
  • [2] Cloud Security Certifications: A Comparison to Improve Cloud Service Provider Security
    Di Giulio, Carlo
    Sprabery, Read
    Kamhoua, Charles
    Kwiat, Kevin
    Campbell, Roy H.
    Bashir, Masooda N.
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [3] An Initiation for Testing the Security of a Cloud Service Provider
    Ajay, D. M.
    Umamaheswari, E.
    PROCEEDINGS OF THE 3RD INTERNATIONAL SYMPOSIUM ON BIG DATA AND CLOUD COMPUTING CHALLENGES (ISBCC - 16'), 2016, 49 : 33 - 41
  • [4] Cloud Service Model's Role in Provider and User Security Investment Incentives
    Yang, Mingwen
    Jacob, Varghese S.
    Raghunathan, Srinivasan
    PRODUCTION AND OPERATIONS MANAGEMENT, 2021, 30 (02) : 419 - 437
  • [5] Bank reputation, bank commitment, and the effects of competition in credit markets
    Dinç, IS
    REVIEW OF FINANCIAL STUDIES, 2000, 13 (03): : 781 - 812
  • [6] Cloud Service Provider Security Readiness Model: The Malaysian Perspective
    Ahmad, Nur Ilyani
    Mohamed, Ibrahim
    Daud, Maslina
    Jarno, Ahmad Dahari
    Hamid, Norlaili Abdul
    PROCEEDING OF 2019 INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI), 2019, : 75 - 80
  • [7] Measuring Security for Cloud Service Provider : A Third Party Approach
    Whaiduzzaman, Md
    Gani, Abdullah
    2013 INTERNATIONAL CONFERENCE ON ELECTRICAL INFORMATION AND COMMUNICATION TECHNOLOGY (EICT), 2013,
  • [8] Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach
    Li, Xiang
    Wang, Qixu
    Lan, Xiao
    Chen, Xingshu
    Zhang, Ning
    Chen, Dajiang
    IEEE ACCESS, 2019, 7 : 9368 - 9383
  • [9] Cloud Security: from Per-Provider to Per-Service Security SLAs
    De Benedictis, Alessandra
    Casola, Valentina
    Rakt, Massimiliano
    Villano, Umberto
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 469 - 474
  • [10] Cyber Security Risk Assessment Framework for Cloud Customer and Service Provider
    Kumari, N. Sujata
    Vurukonda, Naresh
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (12) : 683 - 697