Skip to main content

Using Game Theory to Secure Smart Contracts in Blockchain

  • Conference paper
  • First Online:
Computer Information Systems and Industrial Management (CISIM 2024)

Abstract

The continuous improvement of internet technology invited many other technologies to integrate to solve different industrial and social problems. The utilization of clouds for data management of online transactions has become indispensable in the present digital world. The demand for cloud applications has been enhanced several times, even though the security threats to cloud data remain an unsolved issue. The smart contract running on blockchain framework is now being used in private, public, and industrial sectors. In the cloud environment, all user activities are divided into two types: honest operational and malicious activities. This, in turn, leads to serious security threats for the cloud system. In this paper, the security issues that arise due to the actions of honest and dishonest pools in the cloud are analyzed. The article tries to address the issues using non-cooperative games and find out the threshold values of the probability of an attack. The paper also defined the defensive user’s state and the probability of building the system secure and risk-free smart contract execution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3), 583–592 (2012)

    Article  Google Scholar 

  2. Mircea, M.: Addressing data security in the cloud. Int. J. Inf. Commun. Eng. 6(6), 798–805 (2012)

    MathSciNet  Google Scholar 

  3. Kolhar, M., Abu-Alhaj, M.M., Abd Elatty, S.M.: Cloud data auditing techniques with a focus on privacy and security. IEEE Secur. Priv. 15(1), 42–51 (2017)

    Google Scholar 

  4. Sinjilawi, Y.K., AL-Nabhan, M.Q., Abu-Shanab, E.A.: Addressing security and privacy issues in cloud computing. J. Emerg. Technol. Web Intell. 6(2), 192–199 (2014)

    Google Scholar 

  5. Malina, L., Hajny, J., Dzurenda, P., Zeman, V.: Privacy-preserving security solution for cloud services. J. Appl. Res. Technol. 13(1), 20–31 (2015)

    Article  Google Scholar 

  6. Navya, G., Tech, M.: Crypt cloud: protected and significant information admission manage for cloud storage . XI 1651, 1651–1657 (2019)

    Google Scholar 

  7. Kamhoua, C.A., Kwiat, L., Kwiat, K.A., Park, J.S., Zhao, M., Rodriguez, M.: Game theoretic modeling of security and inter dependency in a public cloud. In: IEEE International Conference on Cloud Computing, CLOUD, pp. 514–521 (2014)

    Google Scholar 

  8. Adili, M.T., Mohammadi, A., Manshaei, M.H., Rahman, M.A.: A cost-effective security management for clouds: a game-theoretic deception mechanism. In: 2017 IFIP/IEEE International Symposium on Integrated Network and Service Management, pp. 98–106 (2017)

    Google Scholar 

  9. Samanta, A.K., Chaki, N.: ToSSecC: two-stage solution for securing cloud data using game theory. In: 2021 International Conference on Data Analytics for Business and Industry (ICDABI), pp. 683–688 (2021)

    Google Scholar 

  10. Zhao, T., Gasiba, T., Lechner, U., Pinto-Albuquerque, M.: Raising awareness about cloud security in industry through a board game. Information 12(11), 482 (2021)

    Article  Google Scholar 

  11. Sun, P.J.: Research on the optimization management of cloud privacy strategy based on evolution game. Secur. Commun. Netw. 2020(2020), 1–18 (2020)

    Google Scholar 

  12. Zhang, R., Li, Y., Li, H., Wang, Q.: Evolutionary game analysis on cloud providers and enterprises’ strategies for migrating to cloud-native under digital transformation. Electronics 11(10), 1584 (2022)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashis Kumar Samanta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Samanta, A.K., Chaki, N. (2024). Using Game Theory to Secure Smart Contracts in Blockchain. In: Saeed, K., Dvorský, J. (eds) Computer Information Systems and Industrial Management. CISIM 2024. Lecture Notes in Computer Science, vol 14902. Springer, Cham. https://doi.org/10.1007/978-3-031-71115-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-71115-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-71114-5

  • Online ISBN: 978-3-031-71115-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics