SlideShare a Scribd company logo
1 of 5
Download to read offline
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
AUDITING A CLOUD PROVIDER’S COMPLIANCE WITH DATA BACKUP
REQUIREMENTS: A GAME THEORETICAL ANALYSIS.
Abstract—
The new developments in cloud computing have introduced significant security
challenges to guarantee the confidentiality, integrity, and availability of
outsourced data. A Service Level Agreement (SLA) is usually signed between
the cloud provider and the customer. For redundancy purposes, it is important
to verify the cloud provider’s compliance with data backup requirements in the
SLA. There exist a number of security mechanisms to check the integrity and
availability of outsourced data. This task can be performed by the customer or
be delegated to an independent entity that we will refer to as the verifier.
However, checking the availability of data introduces extra costs, which can
discourage the customer of performing data verification too often. The
interaction between the verifier and the cloud provider can be captured using
game theory in order to find an optimal data verification strategy. In this
paper, we formulate this problem as a two player non-cooperative game. We
consider the case in which each type of data is replicated a number of times
which can depend on a set of parameters including, among others, its size and
sensitivity. We analyze the strategies of the cloud provider and the verifier at
the Nash Equilibrium and derive the expected behaviour of both players.
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
Finally, we validate our model numerically on a case study and explain how we
evaluate the parameters in the model.
CONCLUSION
In this paper, we analysed the problem of verifying data availability in the case
of data outsourced to a cloud provider. We formulated the problem between
the CP and the TPA as a non-cooperative game. The TPA’s objective is to detect
any deviation from the agreement signed between the CP and the client by
checking the existence of the required number of backup copies of each type
of data on the CP’s servers. On the other hand, the CP’s objective is to increase
the storage capacity on his servers, which translates in practice in the existence
of a number of copies less than the required number included in the contract
with the client. We performed an in-depth analysis of multiple extensions of
the simple model in [4] taking into account the existence of multiple backup
copies of each data. In each proposed extension, we identified the optimal
verification strategy for the TPA. Finally, we validated our analytical results on
a case study. One of the interesting results that we found relates to the
stackelberg game in which we have a leader (the TPA) and a follower (the CP)
in the game. This type of games reflects realistic scenarios that we can
encounter in real life. Interestingly, our results show that a NE of the game
exists and when it is achieved, the CP cannot improve his utility by acting
dishonestly. At the NE, it is as if the trust of the TPA in the CP’s actions
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
outweighs any belief of a potential misconduct. The results in this paper rely
on the basic assumption of the rationality of the CP and the TPA, which is a
reasonable hypothesis in this case. However, one may argue about the
relevance of the different types of parameters introduced in the model and the
cost allocations (who will need to pay what). For instance, the signed
agreement between the CP and the client can specify that the CP must always
take charge of the cost of executing the verification query. While this is a
realistic assumption, always taking the burden of this cost by the CP may result
in an abusive verification behaviour by the TPA. Therefore, in this paper, we
distinguished which player needs to pay that cost according to the detection of
a malicious act by the CP. With ✏F, these parameters play the role of
incentives and punishments for the CP and allow us to analyze their
subsequent effects on his behavior. In addition, the analysis of the different
types of games can be used not only to study the behavior of players, but can
also be leveraged to help adjust these incentives and punishments to be
aligned with the client’s interests when negotiating an SLA with a CP. The
model presented in this paper can be adapted to verify the existence of the
required number of backup copies in specific geographical locations as is
sometimes specified in an SLA. As future work, we plan to investigate the case
where interactions between the CP and the TPA can occur on multiple
occasions over time. This type of interactions is particularly interesting if we
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
consider a repeated game setting where we have a number of TPAs, on behalf
of multiple clients, verifying the CP’s compliance with the signed agreements
with the clients. In this case, the result of the interactions between the CP and
a client is not limited to that particular client, but extends to impact the
behavior of all the other players in the game. For example, we can study how
the discovery of an improper act by the CP can affect his reputation and
therefore his future payoffs, as clients will be more inclined to change
provider.
REFERENCES
*1+ P. Mell and T. Grance, “The NIST definition of cloud computing (draft),”
NIST special publication, vol. 800, no. 145, p. 7, 2011.
[2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D.
Patterson, A. Rabkin, I. Stoica et al., “A view of cloud computing,”
Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010.
*3+ A. Kochumol and M. Win, “Proving possession and retrievability within a
cloud environment: A comparative survey,” International Journal of Computer
Science and Information Technologies, vol. 5, no. 1, pp. 478– 485, 2014.
*4+ B. Djebaili, C. Kiennert, J. Leneutre, and L. Chen, “Data integrity and
availability verification game in untrusted cloud storage,” in Proceedings of the
5th International Conference on Decision and Game Theory for Security
(GameSec), 2014, pp. 287–306.
CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249)
MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com
Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com
*5+ R. Popa, J. Lorch, D. Molnar, H. Wang, and L. Zhuang, “Enabling security in
cloud storage SLAs with CloudProof,” in Proceedings of the 2011 USENIX
Conference on USENIX Annual Technical Conference, ser. USENIXATC’11, 2011,
pp. 31–31.
*6+ C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing
for data storage security in cloud computing,” in INFOCOM, 2010, pp. 1–9.
*7+ G. Ateniese, R. Di Pietro, L. Mancini, and G. Tsudik, “Scalable and efficient
provable data possession,” in Proceedings of the 4th international conference
on Security and privacy in communication networks, 2008.
*8+ C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic
provable data possession,” in Proceedings of the 16th ACM conference on
Computer and communications security, 2009, pp. 213–222.
[9] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. Yau, “Efficient provable data
possession for hybrid clouds,” in Proceedings of the 17th
ACM Conference on
Computer and Communications Security, ser. CCS ’10, 2010, pp. 756–758.
*10+ J. Yang, H. Wang, J. Wang, C. Tan, and D. Yu, “Provable data possession of
resource-constrained mobile devices in cloud computing,” JNW, vol. 6, no. 7,
pp. 1033–1040, 2011.
*11+ A. Juels and B. Kaliski, “PORs: Proofs of retrievability for large files,” in
Proceedings of the 14th ACM conference on Computer and communications
security, 2007, pp. 584–597.

More Related Content

Similar to AUDITING A CLOUD PROVIDER’S COMPLIANCE WITH DATA BACKUP REQUIREMENTS: A GAME THEORETICAL ANALYSIS.

SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
Shakas Technologies
 
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
1crore projects
 
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud StorageThird Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
ijtsrd
 
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDSSECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
Gyan Prakash
 
Cloud Computing: What's Its Business Potential for Your Company?
Cloud Computing: What's Its Business Potential for Your Company?Cloud Computing: What's Its Business Potential for Your Company?
Cloud Computing: What's Its Business Potential for Your Company?
white paper
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
IJSRD
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
IJSRD
 

Similar to AUDITING A CLOUD PROVIDER’S COMPLIANCE WITH DATA BACKUP REQUIREMENTS: A GAME THEORETICAL ANALYSIS. (20)

SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
SECURE OPTIMIZATION COMPUTATION OUTSOURCING IN CLOUD COMPUTING: A CASE STUDY ...
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computing
 
Cloud IT Economics: What you don't know about TCO can hurt you
Cloud IT Economics: What you don't know about TCO can hurt youCloud IT Economics: What you don't know about TCO can hurt you
Cloud IT Economics: What you don't know about TCO can hurt you
 
Collaboration and fairness-aware big data management in distributed clouds
Collaboration  and fairness-aware big data management in distributed cloudsCollaboration  and fairness-aware big data management in distributed clouds
Collaboration and fairness-aware big data management in distributed clouds
 
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service ProvidersSelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
 
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
PROBABILISTIC OPTIMIZATION OF RESOURCE DISTRIBUTION AND ENCRYPTION FOR DATA S...
 
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
ATTRIBUTE-BASED DATA SHARING SCHEME REVISITED IN CLOUD COMPUTING,bulk ieee pr...
 
Pricing analysis with DataRobot at NTUC Income
Pricing analysis with DataRobot at NTUC IncomePricing analysis with DataRobot at NTUC Income
Pricing analysis with DataRobot at NTUC Income
 
Third Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud StorageThird Party Public Auditing Scheme for Security in Cloud Storage
Third Party Public Auditing Scheme for Security in Cloud Storage
 
The cloud: financial, legal and technical
The cloud: financial, legal and technicalThe cloud: financial, legal and technical
The cloud: financial, legal and technical
 
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
Final year IEEE 2016-2017 PROJECTS TITLES (IEEE 2016 papers) For ME,M.Tech,BE...
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Cloud provider transparency
Cloud provider transparencyCloud provider transparency
Cloud provider transparency
 
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDSSECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
SECURE & EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS
 
Cloud Computing: What's Its Business Potential for Your Company?
Cloud Computing: What's Its Business Potential for Your Company?Cloud Computing: What's Its Business Potential for Your Company?
Cloud Computing: What's Its Business Potential for Your Company?
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud StorageImproved Data Integrity Protection Regenerating-Coding Based Cloud Storage
Improved Data Integrity Protection Regenerating-Coding Based Cloud Storage
 
Information Technology: A qualitative assessment of two billing models - Prab...
Information Technology: A qualitative assessment of two billing models - Prab...Information Technology: A qualitative assessment of two billing models - Prab...
Information Technology: A qualitative assessment of two billing models - Prab...
 
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
 
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...Ieeepro techno solutions  ieee java project - balancing performance,accuracy ...
Ieeepro techno solutions ieee java project - balancing performance,accuracy ...
 

More from Nexgen Technology

More from Nexgen Technology (20)

MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...     MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CH...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CH...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...  MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENN...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENN...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...    MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHE...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHE...
 
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA... MECHANICAL PROJECTS IN PONDICHERRY,   2020-21  MECHANICAL PROJECTS IN CHENNA...
MECHANICAL PROJECTS IN PONDICHERRY, 2020-21 MECHANICAL PROJECTS IN CHENNA...
 
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennaiIeee 2020 21 vlsi projects in pondicherry,ieee  vlsi projects  in chennai
Ieee 2020 21 vlsi projects in pondicherry,ieee vlsi projects in chennai
 
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
Ieee 2020 21 power electronics in pondicherry,Ieee 2020 21 power electronics
 
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
Ieee 2020 -21 ns2 in pondicherry, Ieee 2020 -21 ns2 projects,best project cen...
 
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
Ieee 2020 21 ns2 in pondicherry,best project center in pondicherry,final year...
 
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
Ieee 2020 21 java dotnet in pondicherry,final year projects in pondicherry,pr...
 
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
Ieee 2020 21 iot in pondicherry,final year projects in pondicherry,project ce...
 
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
Ieee 2020 21 blockchain in pondicherry,final year projects in pondicherry,bes...
 
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
Ieee 2020 -21 bigdata in pondicherry,project center in pondicherry,best proje...
 
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...Ieee 2020 21  embedded in pondicherry,final year projects in pondicherry,best...
Ieee 2020 21 embedded in pondicherry,final year projects in pondicherry,best...
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Recently uploaded (20)

Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

AUDITING A CLOUD PROVIDER’S COMPLIANCE WITH DATA BACKUP REQUIREMENTS: A GAME THEORETICAL ANALYSIS.

  • 1. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com AUDITING A CLOUD PROVIDER’S COMPLIANCE WITH DATA BACKUP REQUIREMENTS: A GAME THEORETICAL ANALYSIS. Abstract— The new developments in cloud computing have introduced significant security challenges to guarantee the confidentiality, integrity, and availability of outsourced data. A Service Level Agreement (SLA) is usually signed between the cloud provider and the customer. For redundancy purposes, it is important to verify the cloud provider’s compliance with data backup requirements in the SLA. There exist a number of security mechanisms to check the integrity and availability of outsourced data. This task can be performed by the customer or be delegated to an independent entity that we will refer to as the verifier. However, checking the availability of data introduces extra costs, which can discourage the customer of performing data verification too often. The interaction between the verifier and the cloud provider can be captured using game theory in order to find an optimal data verification strategy. In this paper, we formulate this problem as a two player non-cooperative game. We consider the case in which each type of data is replicated a number of times which can depend on a set of parameters including, among others, its size and sensitivity. We analyze the strategies of the cloud provider and the verifier at the Nash Equilibrium and derive the expected behaviour of both players.
  • 2. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com Finally, we validate our model numerically on a case study and explain how we evaluate the parameters in the model. CONCLUSION In this paper, we analysed the problem of verifying data availability in the case of data outsourced to a cloud provider. We formulated the problem between the CP and the TPA as a non-cooperative game. The TPA’s objective is to detect any deviation from the agreement signed between the CP and the client by checking the existence of the required number of backup copies of each type of data on the CP’s servers. On the other hand, the CP’s objective is to increase the storage capacity on his servers, which translates in practice in the existence of a number of copies less than the required number included in the contract with the client. We performed an in-depth analysis of multiple extensions of the simple model in [4] taking into account the existence of multiple backup copies of each data. In each proposed extension, we identified the optimal verification strategy for the TPA. Finally, we validated our analytical results on a case study. One of the interesting results that we found relates to the stackelberg game in which we have a leader (the TPA) and a follower (the CP) in the game. This type of games reflects realistic scenarios that we can encounter in real life. Interestingly, our results show that a NE of the game exists and when it is achieved, the CP cannot improve his utility by acting dishonestly. At the NE, it is as if the trust of the TPA in the CP’s actions
  • 3. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com outweighs any belief of a potential misconduct. The results in this paper rely on the basic assumption of the rationality of the CP and the TPA, which is a reasonable hypothesis in this case. However, one may argue about the relevance of the different types of parameters introduced in the model and the cost allocations (who will need to pay what). For instance, the signed agreement between the CP and the client can specify that the CP must always take charge of the cost of executing the verification query. While this is a realistic assumption, always taking the burden of this cost by the CP may result in an abusive verification behaviour by the TPA. Therefore, in this paper, we distinguished which player needs to pay that cost according to the detection of a malicious act by the CP. With ✏F, these parameters play the role of incentives and punishments for the CP and allow us to analyze their subsequent effects on his behavior. In addition, the analysis of the different types of games can be used not only to study the behavior of players, but can also be leveraged to help adjust these incentives and punishments to be aligned with the client’s interests when negotiating an SLA with a CP. The model presented in this paper can be adapted to verify the existence of the required number of backup copies in specific geographical locations as is sometimes specified in an SLA. As future work, we plan to investigate the case where interactions between the CP and the TPA can occur on multiple occasions over time. This type of interactions is particularly interesting if we
  • 4. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com consider a repeated game setting where we have a number of TPAs, on behalf of multiple clients, verifying the CP’s compliance with the signed agreements with the clients. In this case, the result of the interactions between the CP and a client is not limited to that particular client, but extends to impact the behavior of all the other players in the game. For example, we can study how the discovery of an improper act by the CP can affect his reputation and therefore his future payoffs, as clients will be more inclined to change provider. REFERENCES *1+ P. Mell and T. Grance, “The NIST definition of cloud computing (draft),” NIST special publication, vol. 800, no. 145, p. 7, 2011. [2] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica et al., “A view of cloud computing,” Communications of the ACM, vol. 53, no. 4, pp. 50–58, 2010. *3+ A. Kochumol and M. Win, “Proving possession and retrievability within a cloud environment: A comparative survey,” International Journal of Computer Science and Information Technologies, vol. 5, no. 1, pp. 478– 485, 2014. *4+ B. Djebaili, C. Kiennert, J. Leneutre, and L. Chen, “Data integrity and availability verification game in untrusted cloud storage,” in Proceedings of the 5th International Conference on Decision and Game Theory for Security (GameSec), 2014, pp. 287–306.
  • 5. CONTACT: PRAVEEN KUMAR. L (, +91 – 9791938249) MAIL ID: sunsid1989@gmail.com, praveen@nexgenproject.com Web: www.nexgenproject.com, www.finalyear-ieeeprojects.com *5+ R. Popa, J. Lorch, D. Molnar, H. Wang, and L. Zhuang, “Enabling security in cloud storage SLAs with CloudProof,” in Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference, ser. USENIXATC’11, 2011, pp. 31–31. *6+ C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in INFOCOM, 2010, pp. 1–9. *7+ G. Ateniese, R. Di Pietro, L. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proceedings of the 4th international conference on Security and privacy in communication networks, 2008. *8+ C. Erway, A. K¨upc¸ ¨u, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proceedings of the 16th ACM conference on Computer and communications security, 2009, pp. 213–222. [9] Y. Zhu, H. Wang, Z. Hu, G.-J. Ahn, H. Hu, and S. Yau, “Efficient provable data possession for hybrid clouds,” in Proceedings of the 17th ACM Conference on Computer and Communications Security, ser. CCS ’10, 2010, pp. 756–758. *10+ J. Yang, H. Wang, J. Wang, C. Tan, and D. Yu, “Provable data possession of resource-constrained mobile devices in cloud computing,” JNW, vol. 6, no. 7, pp. 1033–1040, 2011. *11+ A. Juels and B. Kaliski, “PORs: Proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security, 2007, pp. 584–597.