首页> 外文会议>International Wireless Communications and Mobile Computing Conference >A secure data storage based on revocation game-theoretic approaches in cloud computing environments
【24h】

A secure data storage based on revocation game-theoretic approaches in cloud computing environments

机译:云计算环境中基于撤销博弈论方法的安全数据存储

获取原文

摘要

Cloud computing is an innovative model that is gaining attention and wide popularity among IT professionals and users. It provides a new mode of use of IT resources by offering everything as a service (storage, servers, network, etc.) and provisioning resources on-demand. In cloud computing environments, users outsource their data to distributed data centers in the cloud and entrust cloud providers with its storage and processing. However, data outsourcing and multi-tenants introduce new security issues that have to be addressed. In fact, being stored externally, data are no longer under the control of their owners. The storage and processing mechanisms may not be fully trustworthy and thus data confidentiality and privacy may be at risk. Therefore, in this paper, we will deal with securing stored data in shared cloud computing environment. First, we will present an overview of the main security issues addressed in the literature. Then we will focus on providing a game-theoretic model to secure the stored data from malicious users. To that purpose, we have proposed a sequential revocation game where cloud users have to choose the best strategy from a set of three strategies in order to revoke and eliminate the malicious user while minimizing their costs. At the end, we will discuss the different outcomes of this game using the subgame perfect Nash equilibrium concept.
机译:云计算是一种创新的模型,正在引起IT专业人员和用户的关注并受到广泛欢迎。它通过提供一切即服务(存储,服务器,网络等)并按需供应资源,从而提供了一种新的IT资源使用模式。在云计算环境中,用户将其数据外包给云中的分布式数据中心,并将其存储和处理委托给云提供商。但是,数据外包和多租户引入了必须解决的新安全问题。实际上,数据存储在外部,不再受其所有者的控制。存储和处理机制可能不完全值得信赖,因此数据机密性和隐私可能会受到威胁。因此,在本文中,我们将处理共享云计算环境中存储数据的安全问题。首先,我们将概述文献中涉及的主要安全问题。然后,我们将专注于提供一种博弈论模型来保护存储的数据免遭恶意用户的攻击。为此,我们提出了一种顺序吊销游戏,其中云用户必须从三种策略中选择最佳策略,以便在最小化成本的同时吊销和消除恶意用户。最后,我们将使用子游戏完美纳什均衡概念讨论该游戏的不同结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号