Skip to main content

A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12384))

Abstract

Cloud computing can provide on-demand resource services for customers, but also faces server downtime and security issues. The cloud Service Level Agreement (SLA), as a compensation agreement between customers and service providers, has some problems such as non active execution, disputes and infringement. Existing SLA monitoring solutions either lack multi-party trust, have weak audit ability, or have privacy issue. To address the above problems, a blockchain-based cloud SLA violation monitoring and auditing model is proposed. This model provides multi-party trust through blockchain, ensures data authenticity by a dual monitoring method and keeps monitoring result securely stored on the blockchain by appling trapdoor order revealing encryption algorithm (TORE). Besides, a smart contract is designed to automatically perform auditing tasks to ensure credible violation judgment and privacy preserving. At last, some punishment strategies for violations are introduced, which can distribute compensation or change user’s reputation with smart contracts. With experiments, we exam the cost of the blockchain-based system and demonstrate the feasibility of our proposed model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: ACM SIGMOD, pp. 563–574 (2004)

    Google Scholar 

  2. Boneh, D., Lewi, K., Raykova, M., Sahai, A., Zhandry, M., Zimmerman, J.: Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 563–594. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46803-6_19

    Chapter  Google Scholar 

  3. Chenette, N., Lewi, K., Weis, S.A., Wu, D.J.: Practical order-revealing encryption with limited leakage. In: Peyrin, T. (ed.) FSE 2016. LNCS, vol. 9783, pp. 474–493. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-52993-5_24

    Chapter  MATH  Google Scholar 

  4. Kaaniche, N., Mohamed, M., Laurent, M., Ludwig, H.: Security SLA based monitoring in clouds. In: IEEE EDGE, pp. 90–97. IEEE (2017)

    Google Scholar 

  5. Lewi, K., Wu, D.J.: Order-revealing encryption: new constructions, applications, and lower bounds. In: ACM SIGSAC, pp. 1167–1178 (2016)

    Google Scholar 

  6. Macías, M., Guitart, J.: Analysis of a trust model for SLA negotiation and enforcement in cloud markets. Future Gener. Comput. Syst. 55, 460–472 (2016)

    Article  Google Scholar 

  7. Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system. Bitcoin (2008). https://bitcoin.org/bitcoin.pdf

  8. Nakashima, H., Aoyama, M.: An automation method of SLA contract of web APIs and its platform based on blockchain concept. In: IEEE ICCC, pp. 32–39. IEEE (2017)

    Google Scholar 

  9. Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: ACM SIGSAC, pp. 644–655 (2015)

    Google Scholar 

  10. Nawaz, F., Hussain, O., Hussain, F.K., Janjua, N.K., Saberi, M., Chang, E.: Proactive management of SLA violations by capturing relevant external events in a cloud of things environment. Future Gener. Comput. Syst. 95, 26–44 (2019)

    Article  Google Scholar 

  11. Nguyen, H.T., Zhao, W., Yang, J.: A trust and reputation model based on Bayesian network for web services. In: IEEE ICWS, pp. 251–258. IEEE (2010)

    Google Scholar 

  12. Park, K.-W., Han, J., Chung, J. and Park, K.H.: Themis: a mutually verifiable billing system for the cloud computing environment. IEEE Trans. Serv. Comput. 6(3), 300–313 (2013)

    Google Scholar 

  13. Wonjiga, A.T., Peisert, S., Rilling, L., Morin, C.: Blockchain as a trusted component in cloud SLA verification. In: ACM International Conference on Utility and Cloud Computing Companion, pp. 93–100 (2019)

    Google Scholar 

  14. Zhou, H., Ouyang, X., Ren, Z., Su, J., de Laat, C., Zhao, Z.: A blockchain based witness model for trustworthy cloud service level agreement enforcement. In: IEEE INFOCOM, pp. 1567–1575. IEEE (2019)

    Google Scholar 

  15. Zhou, S., Wu, L., Jin, C.: A privacy-based SLA violation detection model for the security of cloud computing. China Commun. 14(9), 155–165 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yunhua He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiao, K., Geng, Z., He, Y., Xu, G., Wang, C., Cheng, W. (2020). A Blockchain Based Privacy-Preserving Cloud Service Level Agreement Auditing Scheme. In: Yu, D., Dressler, F., Yu, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2020. Lecture Notes in Computer Science(), vol 12384. Springer, Cham. https://doi.org/10.1007/978-3-030-59016-1_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-59016-1_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-59015-4

  • Online ISBN: 978-3-030-59016-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics