Researches on Data Correctness and Completeness in Cloud Computing Based on Game Theory

被引:0
|
作者
Yu, Yonghong [1 ]
Wu, Li [2 ]
机构
[1] Anhui Univ Finance & Econ, Dept Comp, Bengbu, Anhui, Peoples R China
[2] Anhui Univ Finance & Econ, Sch Finance & Publ Adm, Anhua, Peoples R China
来源
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5 | 2014年 / 496-500卷
关键词
cloud computing; game theory; data security;
D O I
10.4028/www.scientific.net/AMM.496-500.2069
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ensuring data correctness and data completeness in cloud computing, in addition to security technologies, many other factors need also be considered, such as the behaviors of participants of cloud computing. This paper discusses the data correctness and completeness in cloud computing based on the perspective of game theory. It built a complete information static game theory frame between a trusted data center and an un-trusted database service provider, and gave the mixed strategy Nash equilibrium. It also proposed some countermeasures and suggestions to improve the data security in cloud computing.
引用
收藏
页码:2069 / +
页数:2
相关论文
共 50 条
  • [21] Game theory-based virtual machine migration for energy sustainability in cloud data centers
    Maldonado-Carrascosa, Francisco Javier
    Garcia-Galan, Sebastian
    Valverde-Ibanez, Manuel
    Marciniak, Tomasz
    Szczerska, Malgorzata
    Ruiz-Reyes, Nicolas
    APPLIED ENERGY, 2024, 372
  • [22] A task scheduling algorithm considering game theory designed for energy management in cloud computing
    Yang, Jiachen
    Jiang, Bin
    Lv, Zhihan
    Choo, Kim-Kwang Raymond
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 105 : 985 - 992
  • [23] Investigating the Adoption of Hybrid Encrypted Cloud Data Deduplication With Game Theory
    Liang, Xueqin
    Yan, Zheng
    Deng, Robert H.
    Zheng, Qinghua
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2021, 32 (03) : 587 - 600
  • [24] Security of Big Data Based on the Technology of Cloud Computing
    Zhou, Xiaojun
    Lin, Ping
    Li, Zhiyong
    Wang, Yunpeng
    Tan, Wei
    Huang, Meng
    2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 703 - 706
  • [25] A Game theory-based Computation Offloading Method in Cloud-Edge Computing Networks
    Wang, Zhenning
    Wu, Tong
    Zhang, Zhenyu
    Zhou, Huan
    30TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2021), 2021,
  • [26] A Dynamic Access Control Model Based on Game Theory for the Cloud
    Shao, Pengfei
    Jin, Shuyuan
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [27] Distributed Scheduling Approach based on Game Theory in the Federated Cloud
    Shie, Meng-Ru
    Liu, Chien-Yu
    Lee, Yi-Fang
    Lin, Yu-Chun
    Lai, Kuan-Chou
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA), 2014,
  • [28] The Research of Data Security Mechanism Based on Cloud Computing
    Guo, Changyou
    Zheng, Xuefeng
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (03): : 363 - 370
  • [29] Data-intensive Service Mashup Based on Game Theory and Hybrid Fireworks Optimization Algorithm in the Cloud
    Yang, Wanchun
    Zhang, Chenxi
    Mu, Bin
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2015, 39 (04): : 421 - 429
  • [30] Game Theoretic Resource Allocation in Cloud Computing
    Srinivasa, K. G.
    Kumar, Sharath K.
    Kaushik, Shashank U.
    Srinidhi, S.
    Shenvi, Vignesh
    Mishra, Kushgra
    2014 FIFTH INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT), 2014, : 36 - 42