Abstract
In this paper we propose to employ the concept of proof of violation (POV) for the response time auditing in the cloud. A POV scheme enables a user or a service provider to produce a precise proof of either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between users and the service provider in the cloud. To the best of our knowledge, it is the first scheme that can perform response time auditing according to cryptographic evidences without the need of a delivery agent. Experimental results are presented that demonstrate the feasibility of the proposed scheme. Service providers can use the proposed scheme to provide a mutual nonrepudiation guarantee for response time in their service-level agreements.
Similar content being viewed by others
Notes
\(x \cong y\) means x is approximately equal to y.
The transmission time, is the amount of time from the beginning until the end of a message transmission which can be obtained as: message transmission time = latency + length/data transfer rate [12].
The clocks of two computers can be synchronized such as using network time protocol [13]. Generally speaking, it is global aware that synchronized clocks of two computers are close.
References
Myerson JM Best practices to develop SLAs for cloud computing. http://www.ibm.com/developerworks/cloud/library/cl-slastandards/cl-slastandards-pdf.pdf
Alhamad M, Dillon T, Wu C, Chang E (2010) Response time for cloud computing providers. In: Proceedings of the 12th international conference on information integration and web-based applications and services, pp 603–606
Wang Q, Kanemasa Y, Li J, Jayasinghe D, Kawaba M, Pu C (2012) Response time reliability in cloud environments: an empirical study of n-tier applications at high resource utilization. In: Proceedings of the 2012 IEEE 31st symposium on reliable distributed systems (SRDS), pp 378–383
Amazon S3 Service Level Agreement. http://aws.amazon.com/s3-sla/
Gunestas M, Wijesekera D, Elkhodary A (2009) An evidence generation model for web services. In: IEEE international conference on system of systems engineering (SoSE)
Gunestas M, Mehmet M, Wijesekera D, Singhal A (2011) Forensic web services framework. IT Prof 13(3):31–37. doi:10.1109/MITP.2011.41
Ruebsamen T, Reich C (2013) Supporting cloud accountability by collecting evidence using audit agents. In: 2013 IEEE international conference on cloud computing technology and science
Kremer S, Markowitch O, Zhou J (2002) An intensive survey of fair non-repudiation protocols. Comput Commun 25:1601–1621
Hwang G-H, Huang W-S, Peng J-Z (2014) Real-time proof of violation for cloud storage. In: The 6th IEEE international conference on cloud computing technology and science (IEEE CloudCom 2014), December 27–29, Singapore
Haeberlen A (2010) A case for the accountable cloud. ACM SIGOPS Op Syst Rev 44(2):52–57
Hwang G-H, Peng J-Z, Huang W-S (2013) A mutual nonrepudiation protocol for cloud storage with interchangeable accesses of a single account from multiple devices. In: The 12th IEEE international conference on trust, security and privacy in computing and communications (IEEE TrustCom-2013), Melbourne, Australia, 16–18 July
Coulouris G, Dollimore J, Kindberg T (2000) Distributed systems: concepts and design, 3rd edn. Addison Wesley, Boston
Mills DL (2011) Computer network time synchronization: the network time protocol on earth and in space, 2nd edn. CRC Press, Boca Raton (ISBN 978-1-4398-1463-5)
Yumerefendi AR, Chase JS (2007) Strong accountability for network storage. ACM Trans Storage 11:1–11:33
Yumerefendi AR, Chase JS (2004) Trust but verify: accountability for network services. In: Proceedings of the 11th workshop on ACM SIGOPS European workshop
Yumerefendi AR, Chase JS (2005) The role of accountability in dependable distributed systems. In: Proceedings of the first conference on hot topics in system dependability
Popa RA, Lorch JR (2011) Enabling security in cloud storage SLAs with CloudProof. In: USENIX Annual Technical Conference (USENIX)
Hwang G-H, Peng J-Z, Huang W-S (2013) A mutual nonrepudiation protocol for cloud storage with interchangeable accesses of a single account from multiple devices. In: The 12th IEEE international conference on trust, security and privacy in computing and communications (IEEE TrustCom-2013), Melbourne, Australia, 16–18 July
Hwang G-H, Huang W-S, Peng J-Z, Lin Y-W Fulfilling mutual nonrepudiation for cloud storage. To appear in Concurrency and Computation: Practice and Experience
Hwang G-H, Huang W-S, Peng J-Z (2014) Real-time proof of violation for cloud storage. In: The 2014 6th IEEE international conference on cloud computing technology and science (IEEE CloudCom 2014), December 27–29, 2014, Singapore
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hwang, GH., Yuan, YL. Proof of violation for response time auditing in cloud systems. J Supercomput 75, 65–76 (2019). https://doi.org/10.1007/s11227-015-1555-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-015-1555-0