Advertisement

SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments

  • Tuan Phan
  • Danfeng (Daphne) Yao
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 10)

Abstract

Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers in a virtual environment setting. Recent studies identify that malicious users may compromise the semantic integrity of NVE applications and violate the semantic rules of the virtual environments without being detected. In this paper, we propose an efficient audit protocol to detect violations of semantic integrity through a probabilistic checking mechanism done by a third-party audit server.

Keywords

networked virtual environments algorithm audit integrity 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Baughman, N.E., Levine, B.N.: Cheat-proof playout for centralized and distributed online games. In: IEEE INFOCOM, pp. 104–113 (2001)Google Scholar
  2. 2.
    Baughman, N.E., Liberatore, M., Levine, B.N.: Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Trans. Netw. 15(1), 1–13 (2007)CrossRefGoogle Scholar
  3. 3.
    Chen, B.D., Maheswaran, M.: A cheat controlled protocol for centralized online multiplayer games. In: Proceedings of the 3rd Workshop on Network and System Support for Games (NETGAMES), pp. 139–143. ACM Press, New York (2004)Google Scholar
  4. 4.
    Chen, B.D., Maheswaran, M.: A fair synchronization protocol with cheat proofing for decentralized online multiplayer games. In: 3rd IEEE International Symposium on Network Computing and Applications (NCA), pp. 372–375 (2004)Google Scholar
  5. 5.
    Davis, S.B.: Why cheating matters. In: Game Developer’s Conference (2003), http://www.secureplay.com/papers/docs/WhyCheatingMatters.pdf
  6. 6.
    Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable grid computing. In: International Conference on Distributed Computing Systems (ICDCS), pp. 4–11Google Scholar
  7. 7.
    Haber, S., Hatano, Y., Honda, Y., Horne, W., Miyazaki, K., Sander, T., Tezoku, S., Yao, D.: Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 353–362 (2008)Google Scholar
  8. 8.
    Harding-Rolls, P.: Western world MMOG market: 2006 review and forecasts to 2011, Management Report. Screen Digest (March 2007)Google Scholar
  9. 9.
    Jha, S., Katzenbeisser, S., Schallhart, C., Veith, H., Chenney, S.: Enforcing semantic integrity on untrusted clients in networked virtual environments. In: IEEE Symposium on Security and Privacy, pp. 179–186 (2007)Google Scholar
  10. 10.
    Joslin, C., Giacomo, T.D., Magnenat-Thalmann, N.: Collaborative virtual environments: From birth to standardization. IEEE Communications Magzine, 28–33 (April 2004)Google Scholar
  11. 11.
    Joslin, C., Pandzic, I.S., Magnenat-Thalmann, N.: Trends in networked collaborative virtual environments. Computer Communications 26(5), 430–437 (2003)CrossRefGoogle Scholar
  12. 12.
    Knutsson, B., Lu, H., Xu, W., Hopkins, B.: Peer-to-peer support for massively multiplayer games. In: IEEE INFOCOM (2004)Google Scholar
  13. 13.
    Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the 1980 Symposium on Security and Privacy, pp. 122–133. IEEE Computer Society Press, Los Alamitos (1980)Google Scholar
  14. 14.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  15. 15.
    Phan, T., Yao, D.: Select audit: A secure and efficient audit framework for networked virtual environments. Technical Report DCS-TR-642, Rutgers University (2008)Google Scholar
  16. 16.
    Pritchard, M.: How to hurt the hackers: The scoop on internet cheating and how you can combat it, http://www.gamasutra.com/features/20000724/pritchard_pfv.htm
  17. 17.
  18. 18.
  19. 19.
    Yan, J.: Security design in online games. In: ACSAC 2003, Washington, DC, USA, p. 286. IEEE Computer Society, Los Alamitos (2003)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2009

Authors and Affiliations

  • Tuan Phan
    • 1
  • Danfeng (Daphne) Yao
    • 1
  1. 1.Department of Computer ScienceRutgers UniversityPiscatawayUSA

Personalised recommendations