Abstract
The continuous improvement of internet technology invited many other technologies to integrate to solve different industrial and social problems. The utilization of clouds for data management of online transactions has become indispensable in the present digital world. The demand for cloud applications has been enhanced several times, even though the security threats to cloud data remain an unsolved issue. The smart contract running on blockchain framework is now being used in private, public, and industrial sectors. In the cloud environment, all user activities are divided into two types: honest operational and malicious activities. This, in turn, leads to serious security threats for the cloud system. In this paper, the security issues that arise due to the actions of honest and dishonest pools in the cloud are analyzed. The article tries to address the issues using non-cooperative games and find out the threshold values of the probability of an attack. The paper also defined the defensive user’s state and the probability of building the system secure and risk-free smart contract execution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3), 583–592 (2012)
Mircea, M.: Addressing data security in the cloud. Int. J. Inf. Commun. Eng. 6(6), 798–805 (2012)
Kolhar, M., Abu-Alhaj, M.M., Abd Elatty, S.M.: Cloud data auditing techniques with a focus on privacy and security. IEEE Secur. Priv. 15(1), 42–51 (2017)
Sinjilawi, Y.K., AL-Nabhan, M.Q., Abu-Shanab, E.A.: Addressing security and privacy issues in cloud computing. J. Emerg. Technol. Web Intell. 6(2), 192–199 (2014)
Malina, L., Hajny, J., Dzurenda, P., Zeman, V.: Privacy-preserving security solution for cloud services. J. Appl. Res. Technol. 13(1), 20–31 (2015)
Navya, G., Tech, M.: Crypt cloud: protected and significant information admission manage for cloud storage . XI 1651, 1651–1657 (2019)
Kamhoua, C.A., Kwiat, L., Kwiat, K.A., Park, J.S., Zhao, M., Rodriguez, M.: Game theoretic modeling of security and inter dependency in a public cloud. In: IEEE International Conference on Cloud Computing, CLOUD, pp. 514–521 (2014)
Adili, M.T., Mohammadi, A., Manshaei, M.H., Rahman, M.A.: A cost-effective security management for clouds: a game-theoretic deception mechanism. In: 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management, pp. 98–106 (2017)
Samanta, A.K., Chaki, N.: ToSSecC: two-stage solution for securing cloud data using game theory. In: 2021 International Conference on Data Analytics for Business and Industry (ICDABI), pp. 683–688 (2021)
Zhao, T., Gasiba, T., Lechner, U., Pinto-Albuquerque, M.: Raising awareness about cloud security in industry through a board game. Information 12(11), 482 (2021)
Sun, P.J.: Research on the optimization management of cloud privacy strategy based on evolution game. Secur. Commun. Netw. 2020(2020), 1–18 (2020)
Zhang, R., Li, Y., Li, H., Wang, Q.: Evolutionary game analysis on cloud providers and enterprises’ strategies for migrating to cloud-native under digital transformation. Electronics 11(10), 1584 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Samanta, A.K., Chaki, N. (2024). Using Game Theory to Secure Smart Contracts in Blockchain. In: Saeed, K., Dvorský, J. (eds) Computer Information Systems and Industrial Management. CISIM 2024. Lecture Notes in Computer Science, vol 14902. Springer, Cham. https://doi.org/10.1007/978-3-031-71115-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-031-71115-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-71114-5
Online ISBN: 978-3-031-71115-2
eBook Packages: Computer ScienceComputer Science (R0)