Proof of violation for availability in cloud systems

Gwan Hwan Hwang, Shang Yu Yeh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In this paper we study how to fulfill proof of violation (POV) for availability of IaaS systems in the cloud. A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud. To the best of our knowledge, it is the first scheme that can perform availability auditing according to cryptographic proofs. Experimental results are presented that demonstrate the feasibility of the proposed scheme. Service providers can use the proposed scheme to provide a mutual nonrepudiation guarantee for availability in their service-level agreements.

Original languageEnglish
Title of host publication2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings
EditorsKuniaki Uehara, Masahide Nakamura
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509008063
DOIs
Publication statusPublished - 2016 Aug 23
Event15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016 - Okayama, Japan
Duration: 2016 Jun 262016 Jun 29

Publication series

Name2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings

Other

Other15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016
CountryJapan
CityOkayama
Period16/6/2616/6/29

Fingerprint

Availability
Non-repudiation
Auditing
Service Level Agreement
Experimental Results
Demonstrate

Keywords

  • Accountability
  • Auditing
  • Availability
  • Cloud Trust
  • IaaS
  • Proof of Violation

ASJC Scopus subject areas

  • Computer Science(all)
  • Energy Engineering and Power Technology
  • Control and Optimization

Cite this

Hwang, G. H., & Yeh, S. Y. (2016). Proof of violation for availability in cloud systems. In K. Uehara, & M. Nakamura (Eds.), 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings [7550739] (2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICIS.2016.7550739

Proof of violation for availability in cloud systems. / Hwang, Gwan Hwan; Yeh, Shang Yu.

2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings. ed. / Kuniaki Uehara; Masahide Nakamura. Institute of Electrical and Electronics Engineers Inc., 2016. 7550739 (2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hwang, GH & Yeh, SY 2016, Proof of violation for availability in cloud systems. in K Uehara & M Nakamura (eds), 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings., 7550739, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings, Institute of Electrical and Electronics Engineers Inc., 15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016, Okayama, Japan, 16/6/26. https://doi.org/10.1109/ICIS.2016.7550739
Hwang GH, Yeh SY. Proof of violation for availability in cloud systems. In Uehara K, Nakamura M, editors, 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc. 2016. 7550739. (2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings). https://doi.org/10.1109/ICIS.2016.7550739
Hwang, Gwan Hwan ; Yeh, Shang Yu. / Proof of violation for availability in cloud systems. 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings. editor / Kuniaki Uehara ; Masahide Nakamura. Institute of Electrical and Electronics Engineers Inc., 2016. (2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings).
@inproceedings{e681f29b400543e4834191df871a60bc,
title = "Proof of violation for availability in cloud systems",
abstract = "In this paper we study how to fulfill proof of violation (POV) for availability of IaaS systems in the cloud. A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud. To the best of our knowledge, it is the first scheme that can perform availability auditing according to cryptographic proofs. Experimental results are presented that demonstrate the feasibility of the proposed scheme. Service providers can use the proposed scheme to provide a mutual nonrepudiation guarantee for availability in their service-level agreements.",
keywords = "Accountability, Auditing, Availability, Cloud Trust, IaaS, Proof of Violation",
author = "Hwang, {Gwan Hwan} and Yeh, {Shang Yu}",
year = "2016",
month = "8",
day = "23",
doi = "10.1109/ICIS.2016.7550739",
language = "English",
series = "2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
editor = "Kuniaki Uehara and Masahide Nakamura",
booktitle = "2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings",

}

TY - GEN

T1 - Proof of violation for availability in cloud systems

AU - Hwang, Gwan Hwan

AU - Yeh, Shang Yu

PY - 2016/8/23

Y1 - 2016/8/23

N2 - In this paper we study how to fulfill proof of violation (POV) for availability of IaaS systems in the cloud. A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud. To the best of our knowledge, it is the first scheme that can perform availability auditing according to cryptographic proofs. Experimental results are presented that demonstrate the feasibility of the proposed scheme. Service providers can use the proposed scheme to provide a mutual nonrepudiation guarantee for availability in their service-level agreements.

AB - In this paper we study how to fulfill proof of violation (POV) for availability of IaaS systems in the cloud. A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud. To the best of our knowledge, it is the first scheme that can perform availability auditing according to cryptographic proofs. Experimental results are presented that demonstrate the feasibility of the proposed scheme. Service providers can use the proposed scheme to provide a mutual nonrepudiation guarantee for availability in their service-level agreements.

KW - Accountability

KW - Auditing

KW - Availability

KW - Cloud Trust

KW - IaaS

KW - Proof of Violation

UR - http://www.scopus.com/inward/record.url?scp=84988019208&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84988019208&partnerID=8YFLogxK

U2 - 10.1109/ICIS.2016.7550739

DO - 10.1109/ICIS.2016.7550739

M3 - Conference contribution

AN - SCOPUS:84988019208

T3 - 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings

BT - 2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings

A2 - Uehara, Kuniaki

A2 - Nakamura, Masahide

PB - Institute of Electrical and Electronics Engineers Inc.

ER -