A differential game-theoretic model of auditing for data storage in cloud computing

Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Owing to data outsourcing, this new paradigm of data hosting service is also facing many new security challenges. Auditing is essential to make sure that the user's data is correctly stored in the cloud. In this article, the interaction between cloud user and cloud service providers (CSPs) in cloud as a non-cooperative differential game has been studied. In this game formulation, a feedback Nash equilibrium of the game is reviewed and complex decision making processes and interactions between cloud user and CSPs are analysed. The simulation results provide a reference for users and CSPs in setting appropriate energy consumption and optimal strategies.

[1]  Sachin Shetty,et al.  Auditing and analysis of network traffic in cloud environment , 2014, Int. J. Bus. Process. Integr. Manag..

[2]  Roberto Di Pietro,et al.  Scalable and efficient provable data possession , 2008, IACR Cryptol. ePrint Arch..

[3]  Stephen S. Yau,et al.  Dynamic audit services for integrity verification of outsourced storages in clouds , 2011, SAC.

[4]  T. Başar,et al.  Dynamic Noncooperative Game Theory , 1982 .

[5]  Massimo Ficco Security event correlation approach for cloud computing , 2013, Int. J. High Perform. Comput. Netw..

[6]  Li Xu,et al.  Batch public auditing for distributed mobile cloud computing , 2015, Int. J. High Perform. Comput. Netw..

[7]  Cong Wang,et al.  Enabling Cloud Storage Auditing With Key-Exposure Resistance , 2015, IEEE Transactions on Information Forensics and Security.

[8]  Gail-Joon Ahn,et al.  Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage , 2012, IEEE Transactions on Parallel and Distributed Systems.

[9]  Quanyan Zhu,et al.  Dependable Demand Response Management in the Smart Grid: A Stackelberg Game Approach , 2013, IEEE Transactions on Smart Grid.

[10]  Xiaohua Jia,et al.  An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing , 2013, IEEE Transactions on Parallel and Distributed Systems.

[11]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[12]  Hui Li,et al.  Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud , 2012, 2012 IEEE Fifth International Conference on Cloud Computing.

[13]  Farzad Sabahi,et al.  Cloud computing security threats and responses , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[14]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[15]  Reza Curtmola,et al.  Provable data possession at untrusted stores , 2007, CCS '07.

[16]  David W. K. Yeung,et al.  Cooperative Stochastic Differential Games , 2005 .

[17]  Klaus Zaerens,et al.  Gaining the profits of cloud computing in a public authority environment , 2012, Int. J. Comput. Sci. Eng..

[18]  Antonio Puliafito,et al.  Managing volunteer resources in the cloud , 2013, Int. J. Comput. Sci. Eng..

[19]  Wen-Guey Tzeng,et al.  Game-Theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems , 2014, 2014 Eighth International Conference on Software Security and Reliability.