JOURNAL ARTICLE

Verifying cloud service‐level agreement by a third‐party auditor

Hongli ZhangLin YeJiantao ShiXiaojiang DuMohsen Guizani

Year: 2013 Journal:   Security and Communication Networks Vol: 7 (3)Pages: 492-502   Publisher: Hindawi Publishing Corporation

Abstract

ABSTRACT In this paper, we study the important issue of verifying service‐level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third‐party auditor (TPA). A cloud provides users with elastic computing and storage resources in a pay‐as‐you‐go way. An SLA between the cloud and a user is a contract that specifies the computing resources and performances that the cloud should provide to the user. A cloud service provider (CSP) has incentives to cheat on the SLA, for example, providing a user with less central processing unit and memory resources than specified in the SLA, which allows the CSP to support more users and make more profits. A malicious CSP can easily disrupt the existing SLA monitoring/verification techniques by interfering with the monitoring/measurement process. A TPA resolves the trust dilemma between a CSP and its users. Under the TPA framework and the untrusted‐cloud threat model, we design two effective testing algorithms that can detect an SLA violation of the virtual machine memory size. Using real experiments, we demonstrate that our algorithms can detect cloud cheating on a virtual machine's memory size (i.e., SLA violations). Furthermore, we show that our testing algorithms can defend various attacks from a malicious CSP, which tries to hide an SLA violation. Copyright © 2013 John Wiley & Sons, Ltd.

Keywords:
Computer science Service-level agreement Cloud computing Virtual machine Audit Computer security Cheating Service (business) Incentive Process (computing) Operating system Accounting

Metrics

27
Cited By
3.77
FWCI (Field Weighted Citation Impact)
16
Refs
0.94
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Cryptography and Data Security
Physical Sciences →  Computer Science →  Artificial Intelligence
Distributed systems and fault tolerance
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

A practical third-party auditor prototype for cloud storage service

Lo‐Yao Yeh

Year: 2016 Vol: 5350 Pages: 796-799
JOURNAL ARTICLE

Cloud Data Security While using Third Party Auditor

Ashish BhagatRavi Sahu

Journal:   International Journal of Computer Applications Year: 2013 Vol: 70 (16)Pages: 9-13
JOURNAL ARTICLE

Cloud Data Integrity Checking Using Third Party Auditor

Prof. S. R. Nalamwar

Journal:   International Journal for Research in Applied Science and Engineering Technology Year: 2018 Vol: 6 (6)Pages: 598-603
JOURNAL ARTICLE

Trustworthiness of Cloud Service Provider and Efficient Third Party Auditor in Cloud Computing using Access Control

K. IndhuM. GayathriG. Annapoorani

Journal:   International Journal of Recent Technology and Engineering (IJRTE) Year: 2020 Vol: 8 (6)Pages: 1412-1416
© 2026 ScienceGate Book Chapters — All rights reserved.