Third Party Auditing for Service Assurance in Cloud Computing

Nowadays, cloud computing has been identified as new opportunities for migrating to the expected agility, reuse, and adaptive capabilities that can support the ever changing IT trends, requirements and environments. However, for benefits of their own, there are various motivations for cloud service providers (CSPs) to behave unfaithfully toward cloud customers, such as invading data privacy and providing inaccurate data processing results to customers. On the other hand, constrained by computation resources and capabilities, customers mostly cannot independently process big data and perform verification on correctness and completeness. Under this information asymmetry, how to ensure the correctness and completeness of data processing, computation, and mining becomes a practically crucial issue that greatly impacts the widely deployment of cloud computing, as well as the future Internet. Though verifiable computing provides us with approaches to verify the computation results. There is hardly an approach that can ensure a 100\% detection accuracy. In this paper, the concept of using penalty to decrease CSP's incentive to cheat is proposed from a contract theoretical aspect, where cloud service customers can resort to an external auditor to verify the computation results when needed. Then, an auditing contract which consists of penalty and service fee is proposed so that the CSP will be fined when being found out cheating. Subsequently, the problem is formulated to solve the efficient contract under incomplete information market. Furthermore, we give the simulation results to show the audit contract improve the efficiency of the system.

[1]  M. Phil,et al.  PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD COMPUTING , 2015 .

[2]  Robert H. Deng,et al.  Authenticating Query Results in Data Publishing , 2005, ICICS.

[3]  Cong Wang,et al.  Toward publicly auditable secure cloud data storage services , 2010, IEEE Network.

[4]  R. Myerson,et al.  Regulating a Monopolist with Unknown Costs , 1982 .

[5]  R. Subramanian,et al.  Ensuring data storage security in cloud computing using Sobol Sequence , 2010, 2010 First International Conference On Parallel, Distributed and Grid Computing (PDGC 2010).

[6]  Shucheng Yu,et al.  Flexible and publicly verifiable aggregation query for outsourced databases in cloud , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[7]  Xinbing Wang,et al.  Spectrum Trading in Cognitive Radio Networks: A Contract-Theoretic Modeling Approach , 2011, IEEE Journal on Selected Areas in Communications.

[8]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[9]  Zheng Yan,et al.  Context-Aware Verifiable Cloud Computing , 2017, IEEE Access.

[10]  Cong Wang,et al.  Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[11]  Ki-Woong Park,et al.  THEMIS: Towards Mutually Verifiable Billing Transactions in the Cloud Computing Environment , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[12]  Jacques Lawarree,et al.  Collusion in Hierarchical Agency , 2013 .

[13]  M. Mrinalni Vaknishadh,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2012 .

[14]  T. Mulgan The Contract Theory , 2006 .

[15]  G. Bower Mood and memory. , 1981, The American psychologist.

[16]  Craig Gentry,et al.  Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers , 2010, CRYPTO.

[17]  Ahmad-Reza Sadeghi,et al.  Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version) , 2011, Communications and Multimedia Security.

[18]  David P. Baron,et al.  Regulation, Asymmetric Information, and Auditing , 1984 .

[19]  Cong Wang,et al.  Secure and practical outsourcing of linear programming in cloud computing , 2011, 2011 Proceedings IEEE INFOCOM.

[20]  Ilsun You,et al.  Verifiable Auditing for Outsourced Database in Cloud Computing , 2015, IEEE Transactions on Computers.