Proof of violation for availability in cloud systems

Gwan Hwan Hwang, Shang Yu Yeh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper we study how to fulfill proof of violation (POV) for availability of IaaS systems in the cloud. A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud. To the best of our knowledge, it is the first scheme that can perform availability auditing according to cryptographic proofs. Experimental results are presented that demonstrate the feasibility of the proposed scheme. Service providers can use the proposed scheme to provide a mutual nonrepudiation guarantee for availability in their service-level agreements.

Original languageEnglish
Title of host publication2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings
EditorsKuniaki Uehara, Masahide Nakamura
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509008063
DOIs
Publication statusPublished - 2016 Aug 23
Event15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016 - Okayama, Japan
Duration: 2016 Jun 262016 Jun 29

Publication series

Name2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings

Other

Other15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016
CountryJapan
CityOkayama
Period16/6/2616/6/29

Keywords

  • Accountability
  • Auditing
  • Availability
  • Cloud Trust
  • IaaS
  • Proof of Violation

ASJC Scopus subject areas

  • Computer Science(all)
  • Energy Engineering and Power Technology
  • Control and Optimization

Fingerprint Dive into the research topics of 'Proof of violation for availability in cloud systems'. Together they form a unique fingerprint.

  • Cite this

    Hwang, G. H., & Yeh, S. Y. (2016). Proof of violation for availability in cloud systems. In K. Uehara, & M. Nakamura (Eds.), 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings [7550739] (2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICIS.2016.7550739