A game-theoretical and cryptographical approach to crypto-cloud computing and its economical and financial aspects

KIRLAR, Barış Bülent
Ergun, Serap
Weber, Gerhard Wilhelm
Recently, crypto-cloud computing has become an interesting research area with many technical, security, commercial and financial aspects, goals and consequences. The original intention of the cloud is to link computing stations (services) for collaboration. Sharing and coordination of computational resources is important because of the activities between service providers and service requesters. Considering the cooperative functionality of crypto-cloud computing, the use of game theory in that area has became very beneficial. In the sequel, we mathematically associate that area with game theory, i.e., the bargaining and compromising of interests of various "players", by using a game-theoretical approach which arises from networks, servers, operating systems, storage devices, etc. Further, we propose a novel efficient encryption system by using XTR (effective and compact subgroup trace representation) which has the property of semantic security. Those interactions has been constructed in the direction of how cryptographic tools can be used to address a natural optimization problem in the fields of game theory and financial economics. It is believed that game theory and its optimization is going to provide a suitable framework for the design of a crypto-cloud computing system that will be perceived as a strong technique and satisfy the needs of many participants and users of the cloud. The paper ends with a conclusion and an outlook to future studies.


A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing
Bhargava, Bharat; Angın, Pelin; Ranchal, Rohit; Lingayat, Sunil (2015-01-01)
The past decade has witnessed immense developments in the field of network computing thanks to the rise of the cloud computing paradigm, which enables shared access to a wealth of computing and storage resources without needing to own them. While cloud computing facilitates on-demand deployment, mobility and collaboration of services, mechanisms for enforcing security and performance constraints when accessing cloud services are still at an immature state. The highly dynamic nature of networks and clouds ma...
A Structural Model for Students' Adoption of Learning Management Systems: An Empirical Investigation in the Higher Education Context
FINDIK COŞKUNÇAY, Duygu; Alkis, Nurcan; Özkan Yıldırım, Sevgi (2018-04-01)
With the recent advances in information technologies, Learning Management Systems have taken on a significant role in providing educational resources. The successful use of these systems in higher education is important for the implementation, management and continuous improvement of e-learning services to increase the quality of learning. This study aimed to identify the factors affecting higher education students' behavioral intention towards Learning Management Systems. A research model was proposed base...
A Software Development Process Model for Cloud by Combining Traditional Approaches
Hacaloglu, Tuna; Eren, Pekin Erhan; Mishra, Deepti; Mishra, Alok (2015-10-30)
Even though cloud computing is a technological paradigm that has been adopted more and more in various domains, there are few studies investigating the software development lifecycle in cloud computing applications and there is still not a comprehensive software development process model developed for cloud computing yet. Due to the nature of cloud computing that is completely different from the traditional software development, there is a need of suggesting process models to perform the software developmen...
A Quality model for cloud-based enterprise information systems
Şener, Umut; Eren, Pekin Erhan; Department of Information Systems (2016)
Organizations have migrated from on-premise enterprise information systems to Cloud-based Enterprise Information Systems (Cloud-EIS) due to the benefits of cloud computing, such as flexibility, availability on demand, and interdependence in information technology infrastructure. Accordingly, enterprises perceive the significance of the quality of Cloud-EIS for improving their businesses, and they pay more attention to selecting the suitable Cloud-EIS. Having looked at the extensive literature, only a few re...
A Workflow for Offering Hardware Accelerators as a Cloud Computing Service: Implementation and Evaluation
Tırlıoğlu, Anıl; Schmidt, Şenan Ece; Department of Electrical and Electronics Engineering (2022-2)
Cloud computing and hardware accelerators are two paradigm changes in the field of information technologies and computers. Accordingly, this thesis proposes a workflow for offering users hardware accelerators implemented on FPGA as computing resources in a heterogeneous cloud data center. To this end, we perform the virtualization of FPGA resources as reconfigurable regions (RRs) and provide these resources through OpenStack, an open-source cloud resource management platform. Our workflow is designed for S...
Citation Formats
B. B. KIRLAR, S. Ergun, S. Z. ALPARSLAN GÖK, and G. W. Weber, “A game-theoretical and cryptographical approach to crypto-cloud computing and its economical and financial aspects,” ANNALS OF OPERATIONS RESEARCH, pp. 217–231, 2018, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/51936.