Abstract: Cloud computing is an important transition that makes change in service oriented computing technology. Cloud service provider follows pay-as-you-go pricing approach which means consumer uses as many resources as he need and billed by the provider based on the resource consumed. CSP give a quality of service in the form of a service level agreement. For transparent billing, each billing transaction should be protected against forgery and false modifications. Although CSPs provide service billing records, they cannot provide trustworthiness. It is due to user or CSP can modify the billing records. In this case even a third party cannot confirm that the user's record is correct or CSPs record is correct. To overcome these limitations we introduced a secure billing system called THEMIS. For secure billing system THEMIS introduces a concept of cloud notary authority (CNA).
[1]. Ki-Woong Park, Member, IEEE, Jaesun Han, Member, IEEE, JaeWoong Chung, Member, IEEE, and Kyu Ho Park, Member, IEEE Transactions on information forensics and security, Vol. 6, No. 2, JUNE 2012
[2]. Microsoft, "Microsoft, windows azure platform," 2010. [Online].Available: http://www.microsoft.com/windowsazure
[3]. M. Armbrust and A. E. Fox, "Above the clouds: A Berkeley view of cloud computing," EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28, Feb 2009.
[4]. N. Santos, K. P. Gummadi, and R. Rodrigues, "Towards trusted cloud computing," in Proc. of USENIX HotCloud 2009.
[5]. R. T. Snodgrass, S. S. Yao, and C. Collberg, "Tamper detection in audit logs," in Proc. of 30th intl. conf. on Very large data bases, ser. VLDB '04. VLDB Endowment, 2004, pp. 504–515.
[6]. L. C. M. C. Rob Byrom, Roney Cordenonsib, "Apel: An implementation of grid accounting using r-gma," UK e-Science All Hands Conference, Nottingham, September 2005.