Researches on Data Correctness and Completeness in Cloud Computing Based on Game Theory

被引:0
|
作者
Yu, Yonghong [1 ]
Wu, Li [2 ]
机构
[1] Anhui Univ Finance & Econ, Dept Comp, Bengbu, Anhui, Peoples R China
[2] Anhui Univ Finance & Econ, Sch Finance & Publ Adm, Anhua, Peoples R China
来源
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5 | 2014年 / 496-500卷
关键词
cloud computing; game theory; data security;
D O I
10.4028/www.scientific.net/AMM.496-500.2069
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ensuring data correctness and data completeness in cloud computing, in addition to security technologies, many other factors need also be considered, such as the behaviors of participants of cloud computing. This paper discusses the data correctness and completeness in cloud computing based on the perspective of game theory. It built a complete information static game theory frame between a trusted data center and an un-trusted database service provider, and gave the mixed strategy Nash equilibrium. It also proposed some countermeasures and suggestions to improve the data security in cloud computing.
引用
收藏
页码:2069 / +
页数:2
相关论文
共 50 条
  • [31] AN APPLICATION OF CRYPTO CLOUD COMPUTING IN SOCIAL NETWORKS BY COOPERATIVE GAME THEORY
    Ergun, Serap
    Kirlar, Baris Bulent
    Gok, Sirma Zeynep Alparslan
    Weber, Gerhard-Wilhelm
    JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2020, 16 (04) : 1927 - 1941
  • [32] Data Security in Cloud Computing
    Sathyanarayana, T. V.
    Sheela, L. Mary Immaculate
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 822 - 827
  • [33] Data Security in Cloud Computing
    Albugmi, Ahmed
    Alassafi, Madini O.
    Walters, Robert
    Wills, Gary
    2016 FIFTH INTERNATIONAL CONFERENCE ON FUTURE COMMUNICATION TECHNOLOGIES (FGCT), 2016, : 55 - 59
  • [34] Data security in cloud computing
    Meng, Du
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 810 - 813
  • [35] Reliability-based Formation of Cloud Federations Using Game Theory
    Alam, A. B. M. Bodrul
    Halabi, Talal
    Haque, Anwar
    Zulkernine, Mohammad
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [36] Cloud Computing as a Platform for Monetizing Data Services: A Two-Sided Game Business Model
    Bataineh, Ahmed Saleh
    Bentahar, Jamal
    Mizouni, Rabeb
    Wahab, Omar Abdel
    Rjoub, Gaith
    El Barachi, May
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1336 - 1350
  • [37] Service Scheduling in Cloud Computing based on Queuing Game Model
    Lin, Fuhong
    Zhou, Xianwei
    Huang, Daochao
    Song, Wei
    Han, Dongsheng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (05): : 1554 - 1566
  • [38] A cloud computing framework for analysis of agricultural big data based on Dempster–Shafer theory
    Marzieh Mokarram
    Mohammad R. Khosravi
    The Journal of Supercomputing, 2021, 77 : 2545 - 2565
  • [39] A Data Security Framework for Cloud Computing Adoption: Mozambican Government Cloud Computing
    Vumo, Ambrosio Patricia
    Spillner, Josef
    Koepsell, Stefan
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 720 - 729
  • [40] Cloud Computing Based Internet Data Center
    Zheng, Jianping
    Sun, Yue
    Zhou, Wenhui
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 700 - +