Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis

被引:17
|
作者
Ismail, Ziad [1 ]
Kiennert, Christophe [2 ]
Leneutre, Jean [1 ]
Chen, Lin [3 ]
机构
[1] Univ Paris Saclay, Telecom ParisTech, Dept Comp Sci & Networks, Lab Traitement & Commun Informat,Ctr Natl Rech Sc, F-75013 Paris, France
[2] Telecom SudParis, Dept Networks & Telecommun Serv, Ctr Natl Rech Sci, SAMOVAR Serv Repartis Architectures MOdelisation, F-91011 Evry, France
[3] Univ Paris 11, Rech Informat Lab, Dept Comp Sci & Networks, Bat 490, F-91400 Orsay, France
关键词
Cloud storage; SLA compliance; data replication auditing; game theory;
D O I
10.1109/TIFS.2016.2549002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The new developments in cloud computing have introduced significant security challenges to guarantee the confidentiality, integrity, and availability of outsourced data. A service level agreement (SLA) is usually signed between the cloud provider (CP) and the customer. For redundancy purposes, it is important to verify the CP's compliance with data backup requirements in the SLA. There exist a number of security mechanisms to check the integrity and availability of outsourced data. This task can be performed by the customer or be delegated to an independent entity that we will refer to as the verifier. However, checking the availability of data introduces extra costs, which can discourage the customer of performing data verification too often. The interaction between the verifier and the CP can be captured using game theory in order to find an optimal data verification strategy. In this paper, we formulate this problem as a two player non-cooperative game. We consider the case in which each type of data is replicated a number of times, which can depend on a set of parameters including, among others, its size and sensitivity. We analyze the strategies of the CP and the verifier at the Nash equilibrium and derive the expected behavior of both the players. Finally, we validate our model numerically on a case study and explain how we evaluate the parameters in the model.
引用
收藏
页码:1685 / 1699
页数:15
相关论文
共 50 条
  • [21] Cloud Firewall Under Bursty and Correlated Data Traffic: A Theoretical Analysis
    Carvalho, Glaucio H. S.
    Woungang, Isaac
    Anpalagan, Alagan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 1620 - 1633
  • [22] Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing
    Zhang, Wenfang
    Jiao, Heng
    Yan, Zhuoqun
    Wang, Xiaomin
    Khan, Muhammad Khurram
    COMPUTERS & SECURITY, 2023, 125
  • [23] Cloud Service Provider Selection Using Fuzzy data envelopment Analysis Based on SMI Attributes
    Thaha, Thasni
    Kalaiarasan, C.
    Venkatesh, K.A.
    International Journal of Fuzzy System Applications, 2022, 11 (04)
  • [24] Theoretical analysis and numerical simulation of Parrondo's paradox game in space
    Xie, Neng-gang
    Chen, Yun
    Ye, Ye
    Xu, Gang
    Wang, Lin-gang
    Wang, Chao
    CHAOS SOLITONS & FRACTALS, 2011, 44 (06) : 401 - 414
  • [25] A Game Theoretical Analysis of Data Confidentiality Attacks on Smart-Grid AMI
    Ismail, Ziad
    Leneutre, Jean
    Bateman, David
    Chen, Lin
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2014, 32 (07) : 1486 - 1499
  • [26] Data security in decentralized cloud systems – system comparison, requirements analysis and organizational levels
    André Müller
    André Ludwig
    Bogdan Franczyk
    Journal of Cloud Computing, 6
  • [27] Data security in decentralized cloud systems - system comparison, requirements analysis and organizational levels
    Mueller, Andre
    Ludwig, Andre
    Franczyk, Bogdan
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6
  • [28] Game-theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems
    Lin, Chung-Yi
    Tzeng, Wen-Guey
    2014 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY, 2014, : 187 - 195
  • [29] THE HEALTH CARE PROVIDER'S ROLE AND PATIENT COMPLIANCE TO HEALTH PROMOTION ADVICE FROM THE USER'S PERSPECTIVE: ANALYSIS OF THE 2006 NATIONAL HEALTH INTERVIEW SURVEY DATA
    Ndetan, Harrison
    Evans, Marion Willard, Jr.
    Bae, Sejong
    Felini, Martha
    Rupert, Ronald
    Singh, Karan P.
    JOURNAL OF MANIPULATIVE AND PHYSIOLOGICAL THERAPEUTICS, 2010, 33 (06) : 413 - 418
  • [30] A Theoretical Analysis of Temporal Difference Learning in the Iterated Prisoner's Dilemma Game
    Masuda, Naoki
    Ohtsuki, Hisashi
    BULLETIN OF MATHEMATICAL BIOLOGY, 2009, 71 (08) : 1818 - 1850