Cloud computing infrastructure robustness: A game theory approach

Nageswara S.V. Rao, Stephen W. Poole, Fei He, Jun Zhuang, Chris Y.T. Ma, David K.Y. Yau

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

18 Scopus citations

Abstract

A cloud computing infrastructure typically consists of a number of sites that house servers and are connected to the Internet. Its operation critically depends both on cyber components, including servers and routers, and physical components, including fiber and power routes. Both types of components are subject to attacks of different kinds and frequencies, which must be accounted for the initial provisioning and subsequent operation of the infrastructure. The cyber and physical components may be individually attacked and defended, and the infrastructure is required to provide an aggregate computational capacity C. We present a game-theoretic approach for the provisioning and operation of the infrastructure under uniform cost models. We first show that the Nash Equilibrium under different formulations to be computable in polynomial time, and derive provisioning choices to ensure the capacity C with probability P S. Then, we derive conditions for reinforcing the infrastructure, and show that higher robustness levels are achieved by limiting the disclosure of information about the infrastructure.

Original languageEnglish
Title of host publication2012 International Conference on Computing, Networking and Communications, ICNC'12
Pages34-38
Number of pages5
DOIs
StatePublished - 2012
Event2012 International Conference on Computing, Networking and Communications, ICNC'12 - Maui, HI, United States
Duration: Jan 30 2012Feb 2 2012

Publication series

Name2012 International Conference on Computing, Networking and Communications, ICNC'12

Conference

Conference2012 International Conference on Computing, Networking and Communications, ICNC'12
Country/TerritoryUnited States
CityMaui, HI
Period01/30/1202/2/12

Fingerprint

Dive into the research topics of 'Cloud computing infrastructure robustness: A game theory approach'. Together they form a unique fingerprint.

Cite this