Abstract
In this paper, we investigate the interactions between a service provider (SP) and a client, where the client does not have complete information about the security conditions of the service provider. The environment includes several resources of the service provider, a client who sends requests to the service provider, and the signal generated by the service provider and delivered to the client. By taking into account potential attacks on the service provider, we develop an extended signaling game model, where the prior probability of the signaling game is determined by the outcome of a normal form game between an attacker and the service provider as a defender. Our results show different equilibria of the game as well as conditions under which these equilibria can take place. This will eventually help the defender to select the best defense mechanism against potential attacks, given his knowledge about the type of the attacker.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bhadauria, R., Sanyal, S.: Survey on Security Issues in Cloud Computing and Associated Mitigation Techniques (2012, arXiv preprint). arXiv:1204.0764
Chen, D., Zhao, H.: Data security and privacy protection issues in cloud computing. In: International Conference on Computer Science and Electronics Engineering (ICCSEE), pp. 647–651 (2012)
Toosi, A.N., Calheiros, R.N., Buyya, R.: Interconnected cloud computing environments: challenges, taxonomy, and survey. ACM Comput. Surv. (CSUR) 47(1), 7–53 (2014)
Chen, Y.R., Tian, L.Q., Yang, Y.: Model and analysis of user behavior based on dynamic game theory in cloud computing. Dianzi Xuebao Acta Electronica Sinica 39(8), 1818–1823 (2011)
Kamhoua, C., Kwiat, L., Kwiat, K., Park, J. S., Zhao, M., Rodriguez, M.: Game theoretic modeling of security and interdependency in a public cloud. In: IEEE 7th International Conference on Cloud Computing (CLOUD), pp. 514–521 (2014)
Gulbhile, A.S., Patil, M.P., Pawar, P.P., Mahajan, S.V., Barve, S.: Secure radio resource management in cloud computing based cognitive radio networks. Int. J. Sci. Technol. Res. 3(5), 136–139 (2014)
Rajesh, V., Gnanasekar, J.M., Ponmagal, R.S., Anbalagan, P.: Integration of wireless sensor network with cloud. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, pp. 321–323 (2010)
Nix, R., Kantarcioglu, M.: Contractual agreement design for enforcing honesty in cloud outsourcing. In: Walrand, J., Grossklags, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 296–308. Springer, Heidelberg (2012)
Pham, V., Khouzani, M.H.R., Cid, C.: Optimal Contracts for outsourced computation. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 79–98. Springer, Heidelberg (2014)
Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2008)
Acknowledgement
The authors would like to thank Amin Mohammadi for his constructive feedback and insightful suggestions on the primary version of the proposed model and notations.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Mohebbi Moghaddam, M., Manshaei, M.H., Zhu, Q. (2015). To Trust or Not: A Security Signaling Game Between Service Provider and Client. In: Khouzani, M., Panaousis, E., Theodorakopoulos, G. (eds) Decision and Game Theory for Security. GameSec 2015. Lecture Notes in Computer Science(), vol 9406. Springer, Cham. https://doi.org/10.1007/978-3-319-25594-1_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-25594-1_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25593-4
Online ISBN: 978-3-319-25594-1
eBook Packages: Computer ScienceComputer Science (R0)