Advertisement

Predicting Strategic Behavior Using Game Theory for Secure Virtual Machine Allocation in Cloud

  • Priti NarwalEmail author
  • Shailendra Narayan Singh
  • Deepak Kumar
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 4)

Abstract

In cloud computing, security is a very crucial issue to be taken care of. So, game theory can be used as a strategic tool in decision making among users to protect their virtual machines that are hosted on same hypervisor from external as well as internal attacks. In this paper, a payoff matrix and a decision tree are constructed for ‘n’ number of users, and problem of interdependency is dealt with. Then, a unique user is chosen and his choices of investing in security are evaluated till equilibrium is achieved, when attacker launches his ‘m’ number of strategies. Finally, payoff values of each are calculated, and a decision tree is built which shows the strategies for both attacker and jth user, and Nash Equilibrium is also calculated which shows the best response for both players against each other.

Keywords

Cloud computing Dynamic games Game theory Nash equilibrium Payoff Secure allocation Strategy 

References

  1. 1.
    Rahul Savani, Bernhard von Stengel, Game Theory Explorer-Software for the Applied Game Theorist, Article in Computational Management Science 12(1) March 16, 2014, doi: 10.1007/s10287-014-0206.
  2. 2.
    Xiannuan Liang, Yang Xiao, Game Theory for Network Security, IEEE Communications surveys and tutorials, Vol. 15, No. 1, First Quarter 2013, doi: 10.1109/surv.2012.062612.00056.
  3. 3.
    Mohammad Hossein Manshaei, Quanyan Zhu, Tansu Alpcan, Tamer Basar, Game Theory Meets Network Security and Privacy, Game Theory Meets Network Security and Privacy, ACM Computing Surveys, Vol. 45, Issue 3, June 2013, doi: 10.1145/2480741.2480742.
  4. 4.
    Cornell Tech, Michael K. Reiter, Cross-VM side channels and their use to extract private keys, Proceedings of the 2012 ACM conference on computer and communications security, pp. 305–316, October 2012, doi: 10.1145/2382196.2382230.
  5. 5.
    Priti Narwal, Deepak Kumar, Mayank Sharma, A Review of Game–Theoretic Approaches for Secure Virtual Machine Allocation in Cloud, 2nd international Conference on Information and Communication Technology for Competitive Strategies, March 2016, Conference Proceedings by ACM-ICPS, ISBN No. 978-1-4503-3962-9, doi: 10.1145/2905055.2905152.
  6. 6.
    Christian Esposito, Massimo Ficco, Francesco Palmieri, Aniello Castiglione Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory, IEEE Transactions on Computers, Volume: 65, Issue: 8, doi: 10.1109/TC.2015.2389952.
  7. 7.
    Charles A. Kamhoua, Luke Kwiat, Kevin A. Kwiat, Joon S. Park, Ming Zhao, Manuel Rodriguez, Game Theoretic Modeling of Security and Interdependency in a Public Cloud, IEEE International Conference on Cloud Computing, 2014, doi: 10.1109/cloud.2014.75.
  8. 8.
    Parvathy S. Pillai, Student Member, IEEE, and Shrisha Rao, Senior Member, IEEE, Resource Allocation in Cloud Computing using the Uncertainty Principle of Game Theory, IEEE Systems Journal, Volume. 10, Issue. 2, pp. 637–648, doi:  10.1109/JSYST.2014.2314861.
  9. 9.
    Maha Jebalia, Asma Ben Letaifa, Mohamed Hamdi, Sami Tabane, A Comparative Study on Game Theoretic Approaches for Resource Allocation in Cloud Computing Architectures, Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, June 2013, ISSN: 1524-4547, Page(s): 336–341, doi: 10.1109/WETICE.2013.11.
  10. 10.
    Luke Kwiat, Charles A. Kamhoua, Kevin A. Kwiat, Jian Tang, Andrew Martin, Security-aware Virtual Machine Allocation in the Cloud: A Game Theoretic Approach, IEEE 8th International Conference on Cloud Computing, July 2015, ISSN: 2159-6182, Page(s): 556–563, doi: 10.1109/CLOUD.2015.80.
  11. 11.
    Chunxiao Li, Anand Raghunathan, Niraj K. Jha, Secure Virtual Machine Execution under an Untrusted Management OS, IEEE 3rd International Conference on Cloud Computing, July 2010, ISSN:2159-6182, Page(s): 172–179, doi: 10.1109/cloud.2010.29.
  12. 12.
    Lirim Osmani, Salman Toor, Miika Komu, Matti J. Kortelainen et al., Secure Cloud Connectivity for Cloud Applications, IEEE Transactions on Services Computing, 2015, doi. 10.1109/TSC.2015.2469292.
  13. 13.
    Xin Xu and Huiqun Yu, A Game Theory Approach to Fair and Efficient Resource Allocation in Cloud Computing, Hindawi Publishing Corporation mathematical Problems in Engineering, Volume 2014, Article ID 915878, 14 pages, http://dx.doi.org/10.1155/2014/915878.
  14. 14.
    Zexiang Mao, Jingqi Yang, Yanlei Shang, Chuanchang Liu and Junliang Chen, A Game Theory of Cloud Service Deployment, IEEE Ninth World Congress on Services, 2013, doi: 10.1109/services.2013.
  15. 15.
    Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford, Eliminating the Hypervisor Attack Surface for a More Secure Cloud, CCS’11, October 17–21, 2011, doi: 10.1145/2046707.2046754.
  16. 16.
    Yi Han, Tansu Alpcan, Jeffrey Chan, Christopher Leckie, Security Games for Virtual Machine Allocation in Cloud Computing. Decision and Game Theo ry for Security. Springer International Publishing, 2013, page(s): 99–118, doi: 10.1007/978-3-319-02786-9_7.
  17. 17.
    Fei He, Jun Zhuang, Jun, et al., Cloud Computing Infrastructure Robustness: A Game Theory Approach, International Conference on Computing, Networking and Communications, Cloud Computing and Networking Symposium, Jan 2012, doi: 10.1109/ICCNC.2012.6167441.
  18. 18.
    Meng-Ru Shie, Chien-Yu Liu, Yi-Fang Lee, Yu-Chin Lin, Kuan-Chou Lai, Distributed Scheduling Approach based on Game Theory in the Federated Cloud, 2014 International Conference on Information Science & Applications (ICISA), ISSN: 2162-9048, Page(s): 1–4, doi: 10.1109/ICISA.2014.6847388.

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Priti Narwal
    • 1
    Email author
  • Shailendra Narayan Singh
    • 1
  • Deepak Kumar
    • 2
  1. 1.Amity School of Engineering and TechnologyNew DelhiIndia
  2. 2.Amity Institute of Information TechnologyAmity UniversityNoidaIndia

Personalised recommendations