Verification Mechanism for Authenticity of Big Data Cloud Computing Services Based on Game Theory and Smart Contracts
DOI:
https://doi.org/10.54097/fcis.v5i1.11534Keywords:
Big Data Cloud Computing, Smart Contracts, Game Theory, Authenticity Verification, Incentive MechanismAbstract
With the development of big data and cloud computing, ensuring authenticity and validity has become paramount issue. This paper introduces a novel verification mechanism, which is based on game theory and smart contracts, to validate the genuineness of results from cloud services given to users. It not only vouches for the veracity of these results but also promotes participation from trustworthy cloud service providers by introducing a strategically designed incentive system. The designed game-theoretical model combined with the execution sequence of the smart contracts acts as a deterrent against deceitful actions by potential malicious service entities. Experimental results prove the effectiveness and feasibility of this method.
Downloads
References
D. W. Tse, D. Chen, Q. Liu, F. Wang, and Z. Wei, “Emerging issues in cloud storage security: encryption, key management,data redundancy, trust mechanism,” in Multidisciplinary SocialNetworks Research: International Conference, MISNC 2014, Kaohsiung, Taiwan, September 13-14, 2014. Proceedings 0.Springer, 2014, pp. 297–310.
M. Du, K. Wang, Y. Chen, X. Wang, and Y. Sun, “Big data privacy preserving in multi access edge computing for heterogeneous internet of things,” IEEE Communications Magazine,vol. 56, no. 8, pp. 62–67, 2018.
T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu, “Trust management of services in cloud environments: Obstacles and solutions,” ACM Computing Surveys (CSUR), vol. 46, no. 1, pp. 1–30, 2013.
J. Zou, Y. Wang, and M. A. Orgun, “A dispute arbitration protocol based on a peer-to-peer service contract management scheme,” in 2016 IEEE International Conference on Web Services (ICWS). IEEE, 2016, pp. 41–48.
M. Whaiduzzaman and A. Gani, “Measuring security for cloud service provider: A third party approach,” in 2013 International Conference on Electrical Information and Communication Technology (EICT). IEEE, 2014, pp. 1–6.
S. Yuan, J. Li, and C. Wu, “Jora: Blockchain-based efficient joint computing offloading and resource allocation for edge video streaming systems,” Journal of Systems Architecture, vol. 133, p. 102740, 2022.
S. Yuan, J. Li, J. Liang, Y. Zhu, X. Yu, J. Chen, and C. Wu, “Sharding for blockchain based mobile edge computing system: A deep reinforcement learning approach,” in 2021 IEEE Global Communications Conference (GLOBECOM). IEEE, 2021, pp.1–6.
S. Yuan, J. Li, Y. Zhu, C. Wu, and Y. Ding, “An energy-efficient computing offloading framework for blockchain-enabled video streaming systems,” in GLOBECOM 2022-2022 IEEE Global Communications Conference. IEEE, 2022, pp. 5183 5188.
S. Yuan, J. Li, H. Chen, Z. Han, C. Wu, and Y. Zhang, “Jira: Joint incentive design and resource allocation for edge-based real-time video streaming systems,” IEEE Transactions on Wireless Communications, 2022.
S. Wang, Y. Yuan, X. Wang, J. Li, R. Qin, and F.-Y. Wang, “An overview of smart contract: architecture, applications, and future trends,” in 2018 IEEE Intelligent Vehicles Symposium (IV). IEEE, 2018, pp. 108–113.