Verification Mechanism for Authenticity of Big Data Cloud Computing Services Based on Game Theory and Smart Contracts

Authors

  • Ruofei Wang

DOI:

https://doi.org/10.54097/fcis.v5i1.11534

Keywords:

Big Data Cloud Computing, Smart Contracts, Game Theory, Authenticity Verification, Incentive Mechanism

Abstract

With the development of big data and cloud computing, ensuring authenticity and validity has become paramount issue. This paper introduces a novel verification mechanism, which is based on game theory and smart contracts, to validate the genuineness of results from cloud services given to users. It not only vouches for the veracity of these results but also promotes participation from trustworthy cloud service providers by introducing a strategically designed incentive system. The designed game-theoretical model combined with the execution sequence of the smart contracts acts as a deterrent against deceitful actions by potential malicious service entities. Experimental results prove the effectiveness and feasibility of this method.

Downloads

Download data is not yet available.

References

D. W. Tse, D. Chen, Q. Liu, F. Wang, and Z. Wei, “Emerging issues in cloud storage security: encryption, key management,data redundancy, trust mechanism,” in Multidisciplinary SocialNetworks Research: International Conference, MISNC 2014, Kaohsiung, Taiwan, September 13-14, 2014. Proceedings 0.Springer, 2014, pp. 297–310.

M. Du, K. Wang, Y. Chen, X. Wang, and Y. Sun, “Big data privacy preserving in multi access edge computing for heterogeneous internet of things,” IEEE Communications Magazine,vol. 56, no. 8, pp. 62–67, 2018.

T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust management of services in cloud environments: Obstacles and solutions,” ACM Computing Surveys (CSUR), vol. 46, no. 1, pp. 1–30, 2013.

J. Zou, Y. Wang, and M. A. Orgun, “A dispute arbitration protocol based on a peer-to-peer service contract management scheme,” in 2016 IEEE International Conference on Web Services (ICWS). IEEE, 2016, pp. 41–48.

M. Whaiduzzaman and A. Gani, “Measuring security for cloud service provider: A third party approach,” in 2013 International Conference on Electrical Information and Communication Technology (EICT). IEEE, 2014, pp. 1–6.

S. Yuan, J. Li, and C. Wu, “Jora: Blockchain-based efficient joint computing offloading and resource allocation for edge video streaming systems,” Journal of Systems Architecture, vol. 133, p. 102740, 2022.

S. Yuan, J. Li, J. Liang, Y. Zhu, X. Yu, J. Chen, and C. Wu, “Sharding for blockchain based mobile edge computing system: A deep reinforcement learning approach,” in 2021 IEEE Global Communications Conference (GLOBECOM). IEEE, 2021, pp.1–6.

S. Yuan, J. Li, Y. Zhu, C. Wu, and Y. Ding, “An energy-efficient computing offloading framework for blockchain-enabled video streaming systems,” in GLOBECOM 2022-2022 IEEE Global Communications Conference. IEEE, 2022, pp. 5183 5188.

S. Yuan, J. Li, H. Chen, Z. Han, C. Wu, and Y. Zhang, “Jira: Joint incentive design and resource allocation for edge-based real-time video streaming systems,” IEEE Transactions on Wireless Communications, 2022.

S. Wang, Y. Yuan, X. Wang, J. Li, R. Qin, and F.-Y. Wang, “An overview of smart contract: architecture, applications, and future trends,” in 2018 IEEE Intelligent Vehicles Symposium (IV). IEEE, 2018, pp. 108–113.

Downloads

Published

12-09-2023

Issue

Section

Articles

How to Cite

Wang, R. (2023). Verification Mechanism for Authenticity of Big Data Cloud Computing Services Based on Game Theory and Smart Contracts . Frontiers in Computing and Intelligent Systems, 5(1), 5-9. https://doi.org/10.54097/fcis.v5i1.11534