Data integrity and availability verification game in untrusted cloud storage

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The recent trends towards outsourcing data to the Cloud as well as various concerns regarding data integrity and availability created an increasing interest in enabling secure Cloud data-centers. Many schemes addressing data integrity issues and complying with various requirements came to place: high scheme efficiency, stateless verification, unbounded use of queries and retrievability of data. Yet, a critical question remains: how to use these schemes efficiently, i.e. how often should data be verified. Constantly checking is a clear waste of resources but only checking at times increases risks. This paper attempts to resolve this thorny issue by formulating the data integrity check problem as a non-cooperative game and by performing an in-depth analysis on the Nash Equilibrium and the engineering implications behind. Based on our game theoretical analysis, the course of action was to anticipate the Cloud provider’s behavior; we then derive the minimum verification resource requirement, and the optimal strategy of the verifier. Finally, our game theoretical model is validated by showing correctness of the analytical results via simulation on a case study.

Original languageEnglish
Title of host publicationDecision and GameTheory for Security - 5th International Conference, GameSec 2014, Proceedings
EditorsRadha Poovendran, Walid Saad
PublisherSpringer Verlag
Pages287-306
Number of pages20
ISBN (Electronic)9783319126005
DOIs
Publication statusPublished - 1 Jan 2014
Event5th International Conference on Decision and GameTheory for Security, GameSec 2014 - Los Angeles, United States
Duration: 6 Nov 20147 Nov 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8840
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Decision and GameTheory for Security, GameSec 2014
Country/TerritoryUnited States
CityLos Angeles
Period6/11/147/11/14

Keywords

  • Cloud computing
  • Data availability
  • Data integrity
  • Game theory
  • Nash equilibrium

Fingerprint

Dive into the research topics of 'Data integrity and availability verification game in untrusted cloud storage'. Together they form a unique fingerprint.

Cite this