International Conference on Decision and Game Theory for Security

Decision and Game Theory for Security pp 322-333 | Cite as

To Trust or Not: A Security Signaling Game Between Service Provider and Client

  • Monireh Mohebbi Moghaddam
  • Mohammad Hossein Manshaei
  • Quanyan Zhu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9406)

Abstract

In this paper, we investigate the interactions between a service provider (SP) and a client, where the client does not have complete information about the security conditions of the service provider. The environment includes several resources of the service provider, a client who sends requests to the service provider, and the signal generated by the service provider and delivered to the client. By taking into account potential attacks on the service provider, we develop an extended signaling game model, where the prior probability of the signaling game is determined by the outcome of a normal form game between an attacker and the service provider as a defender. Our results show different equilibria of the game as well as conditions under which these equilibria can take place. This will eventually help the defender to select the best defense mechanism against potential attacks, given his knowledge about the type of the attacker.

Keywords

Network security Computation outsourcing Game theory Signaling game 

References

  1. 1.
    Bhadauria, R., Sanyal, S.: Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques (2012, arXiv preprint). arXiv:1204.0764
  2. 2.
    Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 647–651 (2012)Google Scholar
  3. 3.
    Toosi, A.N., Calheiros, R.N., Buyya, R.: Interconnected cloud computing environments: challenges, taxonomy, and survey. ACM Comput. Surv. (CSUR) 47(1), 7–53 (2014)CrossRefGoogle Scholar
  4. 4.
    Chen, Y.R., Tian, L.Q., Yang, Y.: Model and analysis of user behavior based on dynamic game theory in cloud computing. Dianzi Xuebao Acta Electronica Sinica 39(8), 1818–1823 (2011)Google Scholar
  5. 5.
    Kamhoua, C., Kwiat, L., Kwiat, K., Park, J. S., Zhao, M., Rodriguez, M.: Game theoretic modeling of security and interdependency in a public cloud. In: IEEE 7th International Conference on Cloud Computing (CLOUD), pp. 514–521 (2014)Google Scholar
  6. 6.
    Gulbhile, A.S., Patil, M.P., Pawar, P.P., Mahajan, S.V., Barve, S.: Secure radio resource management in cloud computing based cognitive radio networks. Int. J. Sci. Technol. Res. 3(5), 136–139 (2014)CrossRefGoogle Scholar
  7. 7.
    Rajesh, V., Gnanasekar, J.M., Ponmagal, R.S., Anbalagan, P.: Integration of wireless sensor network with cloud. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 321–323 (2010)Google Scholar
  8. 8.
    Nix, R., Kantarcioglu, M.: Contractual agreement design for enforcing honesty in cloud outsourcing. In: Walrand, J., Grossklags, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 296–308. Springer, Heidelberg (2012) CrossRefGoogle Scholar
  9. 9.
    Pham, V., Khouzani, M.H.R., Cid, C.: Optimal Contracts for outsourced computation. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 79–98. Springer, Heidelberg (2014) Google Scholar
  10. 10.
    Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2008) CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Monireh Mohebbi Moghaddam
    • 1
  • Mohammad Hossein Manshaei
    • 1
  • Quanyan Zhu
    • 2
  1. 1.Department of Electrical and Computer EngineeringIsfahan University of Technology (IUT)IsfahanIran
  2. 2.Department of Electrical and Computer EngineeringNew York University (NYU)New YorkUSA

Personalised recommendations