Researches on Data Correctness and Completeness in Cloud Computing Based on Game Theory

2014 ◽  
Vol 496-500 ◽  
pp. 2069-2072
Author(s):  
Yong Hong Yu ◽  
Li Wu

Ensuring data correctness and data completeness in cloud computing, in addition to security technologies, many other factors need also be considered, such as the behaviors of participants of cloud computing. This paper discusses the data correctness and completeness in cloud computing based on the perspective of game theory. It built a complete information static game theory frame between a trusted data center and an un-trusted database service provider, and gave the mixed strategy Nash equilibrium. It also proposed some countermeasures and suggestions to improve the data security in cloud computing.

2014 ◽  
Vol 571-572 ◽  
pp. 22-25
Author(s):  
Yong Hong Yu ◽  
Li Wu

Existing proposals for data privacy in cloud computing have typically been founded on encryption and are not well-balanced on dealing with the contradiction between data privacy and efficient queries. This paper discusses the data privacy in cloud computing based on the perspective of game theory. It built a complete information static game theory frame between a trusted data center and many un-trusted database service providers to avoid the coalition among un-trusted database service providers, and gave Nash equilibrium of mixed strategy. Some influence factors of Nash equilibrium are also analyzed.


Author(s):  
Е.А. Исаев ◽  
E.A. Isaev

The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This technique really makes a number of clear advantages when working with information and is already widely used in a number of areas of scientific and business activities, but many aspects of information security, characteristic of cloud computing is still far from a satisfactory solution. The article discusses the main challenges of information security of cloud computing. A review of methods to ensure data security, the choice of the most secure cloud computing is discussed, and models to provide the method of increasing the security of cloud computing are looked at.


2013 ◽  
Vol 781-784 ◽  
pp. 1546-1549 ◽  
Author(s):  
Li Xia Cao ◽  
Wei Wen Chai

By studying the status of the food safety regulatory, this paper points out the drawbacks of existing researches, that is, lack of operability; Relying on the equilibrium theory of game theory, this paper establishes a practical and effective regulatory game model, gives the models mixed strategy Nash equilibrium solution and a food safety regulatory strategy. Finally, to illustrate the effectiveness and feasibility of the model, an illustrative example is shown.


2013 ◽  
Vol 765-767 ◽  
pp. 1267-1270 ◽  
Author(s):  
Xiang Li ◽  
Zi Fan Liu ◽  
Wen Bing Liu ◽  
An Xu ◽  
Ling Ma

With the cloud computing time arrival, spatial data storage and management technology based on cloud computing are getting more extensive attention and application. But under the cloud environment, how to ensure that the data stored in the cloud security will be a serious challenge. This paper introduces the meaning characteristics and development present situation of cloud computing, and gives the analysis about the advantage of using cloud computing technology to spatial data management. The paper puts forward a spatial data security management model under the cloud environment, and summarizes the key security technologies of the spatial data storage and management.


2013 ◽  
Vol 846-847 ◽  
pp. 1595-1599
Author(s):  
Xiao Ping Xu ◽  
Jun Hu Yan ◽  
Lan Liu

With the application of cloud computing, in data storage, data management, and more widely, how to ensure that cloud computing data security is becoming an important research direction. This paper analyzes the cloud computing data security issues, discusses the cloud computing data security technologies, and proposes a cloud data security solution and the corresponding security mechanism.


2019 ◽  
Vol 9 (4) ◽  
pp. 721 ◽  
Author(s):  
Zhifang Liao ◽  
Zhi Zeng ◽  
Yan Zhang ◽  
Xiaoping Fan

Crowdsourcing has the advantages of being cost-effective and saving time, which is a typical embodiment of collective wisdom and community workers’ collaborative development. However, this development paradigm of software crowdsourcing has not been used widely. A very important reason is that requesters have limited knowledge about crowd workers’ professional skills and qualities. Another reason is that the crowd workers in the competition cannot get the appropriate reward, which affects their motivation. To solve this problem, this paper proposes a method of maximizing reward based on the crowdsourcing ability of workers, they can choose tasks according to their own abilities to obtain appropriate bonuses. Our method includes two steps: Firstly, it puts forward a method to evaluate the crowd workers’ ability, then it analyzes the intensity of competition for tasks at Topcoder.com—an open community crowdsourcing platform—on the basis of the workers’ crowdsourcing ability; secondly, it follows dynamic programming ideas and builds game models under complete information in different cases, offering a strategy of reward maximization for workers by solving a mixed-strategy Nash equilibrium. This paper employs crowdsourcing data from Topcoder.com to carry out experiments. The experimental results show that the distribution of workers’ crowdsourcing ability is uneven, and to some extent it can show the activity degree of crowdsourcing tasks. Meanwhile, according to the strategy of reward maximization, a crowd worker can get the theoretically maximum reward.


2012 ◽  
Vol 1 (2) ◽  
pp. 31-34
Author(s):  
Shameena Begum ◽  
◽  
V.Ratna Vasuki ◽  
K.V.V.Srinivas K.V.V.Srinivas

Author(s):  
Priya Mathur ◽  
Amit Kumar Gupta ◽  
Prateek Vashishtha

Cloud computing is an emerging technique by which anyone can access the applications as utilities over the internet. Cloud computing is the technology which comprises of all the characteristics of the technologies like distributed computing, grid computing, and ubiquitous computing. Cloud computing allows everyone to create, to configure as well as to customize the business applications online. Cryptography is the technique which is use to convert the plain text into cipher text using various encryption techniques. The art and science used to introduce the secrecy in the information security in order to secure the messages is defined as cryptography. In this paper we are going to review few latest Cryptographic algorithms which are used to enhance the security of the data on the cloud servers. We are comparing Short Range Natural Number Modified RSA (SRNN), Elliptic Curve Cryptography Algorithm, Client Side Encryption Technique and Hybrid Encryption Technique to secure the data in cloud.


Sign in / Sign up

Export Citation Format

Share Document