@inproceedings{f59464f1767144ca85f2bc16214d9f5d,
title = "Proof of violation for availability in cloud systems",
abstract = "In this paper we study how to fulfill proof of violation (POV) for availability of IaaS systems in the cloud. A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud. To the best of our knowledge, it is the first scheme that can perform availability auditing according to cryptographic proofs. Experimental results are presented that demonstrate the feasibility of the proposed scheme. Service providers can use the proposed scheme to provide a mutual nonrepudiation guarantee for availability in their service-level agreements.",
keywords = "Accountability, Auditing, Availability, Cloud Trust, IaaS, Proof of Violation",
author = "Hwang, {Gwan Hwan} and Yeh, {Shang Yu}",
note = "Publisher Copyright: {\textcopyright} 2016 IEEE.; 15th IEEE/ACIS International Conference on Computer and Information Science, ICIS 2016 ; Conference date: 26-06-2016 Through 29-06-2016",
year = "2016",
month = aug,
day = "23",
doi = "10.1109/ICIS.2016.7550739",
language = "English",
series = "2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
editor = "Kuniaki Uehara and Masahide Nakamura",
booktitle = "2016 IEEE/ACIS 15th International Conference on Computer and Information Science, ICIS 2016 - Proceedings",
}