Auditing a Cloud Provider's Compliance With Data Backup Requirements: A Game Theoretical Analysis

被引:17
|
作者
Ismail, Ziad [1 ]
Kiennert, Christophe [2 ]
Leneutre, Jean [1 ]
Chen, Lin [3 ]
机构
[1] Univ Paris Saclay, Telecom ParisTech, Dept Comp Sci & Networks, Lab Traitement & Commun Informat,Ctr Natl Rech Sc, F-75013 Paris, France
[2] Telecom SudParis, Dept Networks & Telecommun Serv, Ctr Natl Rech Sci, SAMOVAR Serv Repartis Architectures MOdelisation, F-91011 Evry, France
[3] Univ Paris 11, Rech Informat Lab, Dept Comp Sci & Networks, Bat 490, F-91400 Orsay, France
关键词
Cloud storage; SLA compliance; data replication auditing; game theory;
D O I
10.1109/TIFS.2016.2549002
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The new developments in cloud computing have introduced significant security challenges to guarantee the confidentiality, integrity, and availability of outsourced data. A service level agreement (SLA) is usually signed between the cloud provider (CP) and the customer. For redundancy purposes, it is important to verify the CP's compliance with data backup requirements in the SLA. There exist a number of security mechanisms to check the integrity and availability of outsourced data. This task can be performed by the customer or be delegated to an independent entity that we will refer to as the verifier. However, checking the availability of data introduces extra costs, which can discourage the customer of performing data verification too often. The interaction between the verifier and the CP can be captured using game theory in order to find an optimal data verification strategy. In this paper, we formulate this problem as a two player non-cooperative game. We consider the case in which each type of data is replicated a number of times, which can depend on a set of parameters including, among others, its size and sensitivity. We analyze the strategies of the CP and the verifier at the Nash equilibrium and derive the expected behavior of both the players. Finally, we validate our model numerically on a case study and explain how we evaluate the parameters in the model.
引用
收藏
页码:1685 / 1699
页数:15
相关论文
共 50 条
  • [31] A Theoretical Analysis of Temporal Difference Learning in the Iterated Prisoner’s Dilemma Game
    Naoki Masuda
    Hisashi Ohtsuki
    Bulletin of Mathematical Biology, 2009, 71 : 1818 - 1850
  • [32] ANALYSIS OF WEAKNESSES IN COMPLIANCE WITH AUDITING STANDARDS IN VIEW OF THE RISK OF EXPRESSING AN INAPPROPRIATE AUDITOR'S OPINION ON FINANCIAL STATEMENTS IN CONDITIONS OF GLOBALIZATION
    Kriskova, Petra
    Uzik, Jan
    GLOBALIZATION AND ITS SOCIO-ECONOMIC CONSEQUENCES, 2018, : 1684 - 1690
  • [33] Can Big Data Cure Risk Selection in Healthcare Capitation Program? A Game Theoretical Analysis
    She, Zhaowei
    Ayer, Turgay
    Montanera, Daniel
    M&SOM-MANUFACTURING & SERVICE OPERATIONS MANAGEMENT, 2022, 24 (06) : 3117 - 3134
  • [34] A new theoretical analysis approach for a multi-agent spatial Parrondo's game
    Li, Yin-feng
    Ye, Shun-qiang
    Zheng, Kai-xuan
    Xie, Neng-gang
    Ye, Ye
    Wang, Lu
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2014, 407 : 369 - 379
  • [35] Non-compliance with a nurse’s advice to visit the primary care provider: an exploratory secondary analysis of the TRIAGE-trial
    Ines Homburg
    Stefan Morreel
    Veronique Verhoeven
    Koenraad G. Monsieurs
    Jasmine Meysman
    Hilde Philips
    Diana De Graeve
    BMC Health Services Research, 22
  • [36] Non-compliance with a nurse's advice to visit the primary care provider: an exploratory secondary analysis of the TRIAGE-trial
    Homburg, Ines
    Morreel, Stefan
    Verhoeven, Veronique
    Monsieurs, Koenraad G.
    Meysman, Jasmine
    Philips, Hilde
    De Graeve, Diana
    BMC HEALTH SERVICES RESEARCH, 2022, 22 (01)
  • [37] Theoretical Analysis of Obstruction's Influence on Data Dissemination in Vehicular Networks
    Hu, Miao
    Zhong, Zhangdui
    Ni, Minming
    Wang, Zhe
    AD HOC NETWORKS, ADHOCNETS 2016, 2017, 184 : 105 - 116
  • [38] Data Analysis of Cloud Security Alliance's Security, Trust & Assurance Registry
    Sen, Amartya
    Madria, Sanjay
    ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [39] Optimizing proteomic data access and analysis in the cloud: Leveraging Terra's integration with the Proteomic Data Commons
    LaPlante, Emily
    Huo, Bingxing
    Mani, D. R.
    Thangudu, Ratna R.
    CANCER RESEARCH, 2024, 84 (06)
  • [40] The impact of Taiwan's 2008 elections on cross-strait relations: A game-theoretical analysis
    Wang, Vincent Wei-Cheng
    ASIAN PERSPECTIVE, 2008, 32 (02) : 145 - 172