2016
DOI: 10.1109/tifs.2016.2549002
|View full text |Cite
|
Sign up to set email alerts
|

Auditing a Cloud Provider’s Compliance With Data Backup Requirements: A Game Theoretical Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 16 publications
0
12
0
Order By: Relevance
“…When direct reputation evaluation cannot reach a conclusion, X will implement a reliable recommendation reputation evaluation model based on dynamic game theory strategy [25].…”
Section: Establishing Model Evaluation Systemmentioning
confidence: 99%
“…When direct reputation evaluation cannot reach a conclusion, X will implement a reliable recommendation reputation evaluation model based on dynamic game theory strategy [25].…”
Section: Establishing Model Evaluation Systemmentioning
confidence: 99%
“…The storage space of version data is boosted with the increase of the version files. At the same time, the opportunity of any corrupted version file being identified is decreased since the existing verification algorithms are only oriented to every file instead of a set of version files [10,11] while these files are randomly extracted. A large number of version files result in more verification cost.…”
Section: Motivationmentioning
confidence: 99%
“…This scheme is also applicable to multiple users and multiple clouds. Ziad et al [11] proposed a scheme based on game theory in order to find an optimal data verification strategy. Recently, Zhang et al [15] used indistinguishability obfuscation to reduce the auditor's computation overhead while the auditor is equipped with a low-power device.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations