Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis

被引:17
|
作者
Ismail, Ziad [1 ]
Kiennert, Christophe [2 ]
Leneutre, Jean [1 ]
Chen, Lin [3 ]
机构
[1] Univ Paris Saclay, Telecom ParisTech, Dept Comp Sci & Networks, Lab Traitement & Commun Informat,Ctr Natl Rech Sc, F-75013 Paris, France
[2] Telecom SudParis, Dept Networks & Telecommun Serv, Ctr Natl Rech Sci, SAMOVAR Serv Repartis Architectures MOdelisation, F-91011 Evry, France
[3] Univ Paris 11, Rech Informat Lab, Dept Comp Sci & Networks, Bat 490, F-91400 Orsay, France
关键词
Cloud storage; SLA compliance; data replication auditing; game theory;
D O I
10.1109/TIFS.2016.2549002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The new developments in cloud computing have introduced significant security challenges to guarantee the confidentiality, integrity, and availability of outsourced data. A service level agreement (SLA) is usually signed between the cloud provider (CP) and the customer. For redundancy purposes, it is important to verify the CP's compliance with data backup requirements in the SLA. There exist a number of security mechanisms to check the integrity and availability of outsourced data. This task can be performed by the customer or be delegated to an independent entity that we will refer to as the verifier. However, checking the availability of data introduces extra costs, which can discourage the customer of performing data verification too often. The interaction between the verifier and the CP can be captured using game theory in order to find an optimal data verification strategy. In this paper, we formulate this problem as a two player non-cooperative game. We consider the case in which each type of data is replicated a number of times, which can depend on a set of parameters including, among others, its size and sensitivity. We analyze the strategies of the CP and the verifier at the Nash equilibrium and derive the expected behavior of both the players. Finally, we validate our model numerically on a case study and explain how we evaluate the parameters in the model.
引用
收藏
页码:1685 / 1699
页数:15
相关论文
共 50 条
  • [1] DLoc: Distributed Auditing for Data Location Compliance in Cloud
    Eskandari, Mojtaba
    Crispo, Bruno
    de Oliveira, Anderson Santana
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 : 202 - 218
  • [2] Game Theoretical Analysis on Encrypted Cloud Data Deduplication
    Liang, Xueqin
    Yan, Zheng
    Chen, Xiaofeng
    Yang, Laurence T.
    Lou, Wenjing
    Hou, Y. Thomas
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (10) : 5778 - 5789
  • [3] Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment
    Wu, Songyang
    Song, Lipeng
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 306 - 313
  • [4] Determinants of effective Shariah compliance auditing in Palestine: a theoretical and conceptual analysis
    Faza, Mustafa
    Badwan, Nemer
    Hamdan, Montaser
    JOURNAL OF MONEY LAUNDERING CONTROL, 2024, 27 (05): : 845 - 857
  • [5] A differential game-theoretic model of auditing for data storage in cloud computing
    Li Z.
    Liu Y.
    Liu, Yanzhu (lizhi870218@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (14): : 341 - 348
  • [6] Comparative analysis of cloud data integrity auditing protocols
    Garg, Neenu
    Bawa, Seema
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 17 - 32
  • [7] Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation
    Gao, Lijun
    Yan, Zheng
    Yang, Laurence T.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1003 - 1017
  • [8] Requirements specification of a Cloud Service for Cyber Security Compliance Analysis
    Furfaro, Angelo
    Gallo, Teresa
    Garro, Alfredo
    Sacca, Domenico
    Tundis, Andrea
    2016 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2016, : 205 - 212
  • [9] Towards an analysis of data accountability and auditing for secure cloud data storage
    Prassanna, J.
    Punitha, K.
    Neelanarayanan, V
    BIG DATA, CLOUD AND COMPUTING CHALLENGES, 2015, 50 : 543 - 550
  • [10] CPA FIRM'S CLOUD AUDITING PROVIDER FOR PERFORMANCE EVALUATION AND IMPROVEMENT: AN EMPIRICAL CASE OF CHINA
    Hu, Kuang-Hua
    Chen, Fu-Hsiang
    Tzeng, Gwo-Hshiung
    TECHNOLOGICAL AND ECONOMIC DEVELOPMENT OF ECONOMY, 2018, 24 (06) : 2338 - 2373