Researches on Data Correctness and Completeness in Cloud Computing Based on Game Theory

被引:0
作者
Yu, Yonghong [1 ]
Wu, Li [2 ]
机构
[1] Anhui Univ Finance & Econ, Dept Comp, Bengbu, Anhui, Peoples R China
[2] Anhui Univ Finance & Econ, Sch Finance & Publ Adm, Anhua, Peoples R China
来源
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE IV, PTS 1-5 | 2014年 / 496-500卷
关键词
cloud computing; game theory; data security;
D O I
10.4028/www.scientific.net/AMM.496-500.2069
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Ensuring data correctness and data completeness in cloud computing, in addition to security technologies, many other factors need also be considered, such as the behaviors of participants of cloud computing. This paper discusses the data correctness and completeness in cloud computing based on the perspective of game theory. It built a complete information static game theory frame between a trusted data center and an un-trusted database service provider, and gave the mixed strategy Nash equilibrium. It also proposed some countermeasures and suggestions to improve the data security in cloud computing.
引用
收藏
页码:2069 / +
页数:2
相关论文
共 50 条
  • [41] A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor
    Patel, Hiren
    Patel, Dhiren
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 84 - 87
  • [42] Game Theory-Based Task Offloading and Resource Allocation for Vehicular Networks in Edge-Cloud Computing
    Jiang, Qinting
    Xu, Xiaolong
    He, Qiang
    Zhang, Xuyun
    Dai, Fei
    Qi, Lianyong
    Dou, Wanchun
    2021 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2021, 2021, : 341 - 346
  • [43] Cloud Computing Based Internet Data Center
    Zheng, Jianping
    Sun, Yue
    Zhou, Wenhui
    CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 700 - +
  • [44] Research on the Data Mining Based on Cloud Computing
    Luo, Laixi
    Zhu, Yu
    PROCEEDINGS OF 2020 CHINA MARKETING INTERNATIONAL CONFERENCE (WEB CONFERENCING): MARKETING AND MANAGEMENT IN THE DIGITAL AGE, 2020, : 494 - 505
  • [45] DATA MINING ALGORITHM BASED ON CLOUD COMPUTING
    Hao, Y. J.
    LATIN AMERICAN APPLIED RESEARCH, 2018, 48 (04) : 281 - 285
  • [46] Poster Abstract: A Multi-User Computation Offloading Algorithm based on Game Theory in Mobile Cloud Computing
    Liu, Yujiong
    Wang, Shangguang
    Yang, Fangchun
    2016 FIRST IEEE/ACM SYMPOSIUM ON EDGE COMPUTING (SEC 2016), 2016, : 93 - 94
  • [47] ANALYSIS OF DATA SECURITY IN CLOUD COMPUTING
    Iyer, K. B. Priya
    Manisha, R.
    Subhashree, R.
    Vedhavalli, K.
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 540 - 543
  • [48] An Architecture for Data Security in Cloud Computing
    Sugumaran, M.
    BalaMurugan, B.
    Kamalraj, D.
    2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014), 2014, : 252 - +
  • [49] Data Security: the Challenges of Cloud Computing
    Hu Shuijing
    2014 SIXTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2014, : 203 - 206
  • [50] Research on the key technology of data security protection based on cloud computing
    Guo, Juan
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 66 - 69