Skip to main content

To Trust or Not: A Security Signaling Game Between Service Provider and Client

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9406))

Abstract

In this paper, we investigate the interactions between a service provider (SP) and a client, where the client does not have complete information about the security conditions of the service provider. The environment includes several resources of the service provider, a client who sends requests to the service provider, and the signal generated by the service provider and delivered to the client. By taking into account potential attacks on the service provider, we develop an extended signaling game model, where the prior probability of the signaling game is determined by the outcome of a normal form game between an attacker and the service provider as a defender. Our results show different equilibria of the game as well as conditions under which these equilibria can take place. This will eventually help the defender to select the best defense mechanism against potential attacks, given his knowledge about the type of the attacker.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bhadauria, R., Sanyal, S.: Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques (2012, arXiv preprint). arXiv:1204.0764

  2. Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 647–651 (2012)

    Google Scholar 

  3. Toosi, A.N., Calheiros, R.N., Buyya, R.: Interconnected cloud computing environments: challenges, taxonomy, and survey. ACM Comput. Surv. (CSUR) 47(1), 7–53 (2014)

    Article  Google Scholar 

  4. Chen, Y.R., Tian, L.Q., Yang, Y.: Model and analysis of user behavior based on dynamic game theory in cloud computing. Dianzi Xuebao Acta Electronica Sinica 39(8), 1818–1823 (2011)

    Google Scholar 

  5. Kamhoua, C., Kwiat, L., Kwiat, K., Park, J. S., Zhao, M., Rodriguez, M.: Game theoretic modeling of security and interdependency in a public cloud. In: IEEE 7th International Conference on Cloud Computing (CLOUD), pp. 514–521 (2014)

    Google Scholar 

  6. Gulbhile, A.S., Patil, M.P., Pawar, P.P., Mahajan, S.V., Barve, S.: Secure radio resource management in cloud computing based cognitive radio networks. Int. J. Sci. Technol. Res. 3(5), 136–139 (2014)

    Article  Google Scholar 

  7. Rajesh, V., Gnanasekar, J.M., Ponmagal, R.S., Anbalagan, P.: Integration of wireless sensor network with cloud. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 321–323 (2010)

    Google Scholar 

  8. Nix, R., Kantarcioglu, M.: Contractual agreement design for enforcing honesty in cloud outsourcing. In: Walrand, J., Grossklags, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 296–308. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  9. Pham, V., Khouzani, M.H.R., Cid, C.: Optimal Contracts for outsourced computation. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 79–98. Springer, Heidelberg (2014)

    Google Scholar 

  10. Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2008)

    Book  Google Scholar 

Download references

Acknowledgement

The authors would like to thank Amin Mohammadi for his constructive feedback and insightful suggestions on the primary version of the proposed model and notations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Hossein Manshaei .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Mohebbi Moghaddam, M., Manshaei, M.H., Zhu, Q. (2015). To Trust or Not: A Security Signaling Game Between Service Provider and Client. In: Khouzani, M., Panaousis, E., Theodorakopoulos, G. (eds) Decision and Game Theory for Security. GameSec 2015. Lecture Notes in Computer Science(), vol 9406. Springer, Cham. https://doi.org/10.1007/978-3-319-25594-1_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25594-1_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25593-4

  • Online ISBN: 978-3-319-25594-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics