Skip to main content
Log in

Refined game-theoretic approach to improve authenticity of outsourced databases

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

The verifiable database (VDB) model is characterized by the fact that the database owner, a computationally weak client, delegates the database management to a database service provider on the cloud, which is considered untrusted third party. In this model, users can query the data and verify the integrity of query results. Motivated by the desire to reduce the computational cost and communication overhead of such a verification process, and to support sophisticated query types, such as aggregated queries, some recent VDB approaches used randomized periodic verifications. These new approaches dedicate a new entity called verifier, whose responsibility is to perform the verification process instead of database users. To improve the randomization effectiveness of the verification operations, our previous work has employed game theory and modeled the VDB problem as a leader–follower Stackelberg security game. The model aimed to randomize what database tables to verify at each verification moment. The main problem of this work is its limitation to only one attacker type, which limits its deployment in real and open cloud environments. In this paper, we extend and refine the Stackelberg security game to be a Bayesian security game which further optimizes the mixed strategy of the verifier by considering multiple follower types. Moreover, we analyze the need for randomization of verification moments and identify the best method allowing us to achieve this randomization. Furthermore, we describe and discuss in detail the implementation settings of each component involved in the model. We have implemented and tested the performance of the Bayesian game model against the single follower-type model and the uniform randomization model. Experiment results show that the Bayesian game model performs better when dealing with multiple attacker types.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  • AlShahwan F, Faisal M, Ansa G (2016) Security framework for restful mobile cloud computing web services. J Ambient Intell Hum Comput 7(5):649–659

    Article  Google Scholar 

  • An B, Tambe M, Ordonez F, Shieh EA, Kiekintveld C (2011) Refinement of strong Stackelberg equilibria in security games. In: AAAI

  • Chen X, Li J, Weng J, Ma J, Lou W (2014) Verifiable computation over large database with incremental updates. In: European symposium on research in Computer Security. Springer, Berlin, pp 148–162

  • Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Secure Comput 12(5):546–556

    Article  Google Scholar 

  • Devanbu P, Gertz M, Martel C, Stubblebine SG (2002) Authentic third-party data publication. In: Data and application security. Springer, Berlin, pp 101–112

  • Eltayesh F, Bentahar J (2016) Verifiable outsourced database in the cloud using game theory. In: Proceedings of the 32nd ACM SIGAPP symposium On applied computing, ACM, Accepted

  • Goodrich MT, Tamassia R, Triandopoulos N (2008) Super-efficient verification of dynamic outsourced databases. In: Topics in cryptology–CT-RSA 2008. Springer, Berlin, pp 407–424

  • Kiraz MS (2016) A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J Ambient Intell Hum Comput 7(5):731–760

    Article  Google Scholar 

  • Korzhyk D, Conitzer V, Parr R (2010) Complexity of computing optimal Stackelberg strategies in security resource allocation games. In: AAAI

  • Ma D, Deng RH, Pang H, Zhou J (2005) Authenticating query results in data publishing. In: International conference on information and communications security. Springer, Berlin, pp 376–388

  • Merkle RC (1989) A certified digital signature. In: Conference on the theory and application of cryptology. Springer, Berlin, pp 218–238

  • M’hamdi MA, Bentahar J (2012) Scheduling reputation maintenance in agent-based communities using game theory. J Softw 7(7):1514–1523

    Google Scholar 

  • Mykletun E, Narasimha M, Tsudik G (2003) Providing authentication and integrity in outsourced databases using merkle hash trees. UCI-SCONCE Technical Report

  • Mykletun E, Narasimha M, Tsudik G (2006) Authentication and integrity in outsourced databases. ACM Trans Storage (TOS) 2(2):107–138

    Article  Google Scholar 

  • Narasimha M, Tsudik G (2005) Dsac: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 14th ACM international conference on Information and knowledge management, ACM, pp 235–236

  • Narasimha M, Tsudik G (2006) Authentication of outsourced databases using signature aggregation and chaining. In: International conference on database systems for advanced applications. Springer, Berlin, pp 420–436

  • Pang H, Zhang J, Mouratidis K (2009) Scalable verification for outsourced dynamic databases. Proc VLDB Endow 2(1):802–813

    Article  Google Scholar 

  • Papamanthou C, Tamassia R (2007) Time and space efficient algorithms for two-party authenticated data structures. In: International conference on information and communications security. Springer, Berlin, pp 1–15

  • Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008a) Efficient algorithms to solve Bayesian Stackelberg games for security applications. In: Proc of AAAI, pp 1559–1562

  • Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008b) Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems-Volume 2, International foundation for autonomous agents and multiagent systems, pp 895–902

  • Pita J, Jain M, Marecki J, Ordóñez F, Portway C, Tambe M, Western C, Paruchuri P, Kraus S (2008) Deployed armor protection: the application of a game theoretic model for security at the los angeles international airport. In: Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: industrial track, international foundation for autonomous agents and multiagent systems, pp 125–132

  • Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361–396

    Article  MATH  Google Scholar 

  • Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126

    Article  MathSciNet  MATH  Google Scholar 

  • Thompson B, Haber S, Horne WG, Sander T, Yao D (2009) Privacy-preserving computation and verification of aggregate queries on outsourced databases. In: International symposium on privacy enhancing technologies symposium. Springer, Berlin, pp 185–201

  • Von Stackelberg H (1934) Marktform und gleichgewicht. Springer

  • Wahab OA, Bentahar J, Otrok H, Mourad A (2016) A Stackelberg game for distributed formation of business-driven services communities. Expert Syst Appl 45:359–372

    Article  Google Scholar 

  • Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303

    Article  MathSciNet  MATH  Google Scholar 

  • Xie M, Wang H, Yin J, Meng X (2007) Integrity auditing of outsourced data. In: Proceedings of the 33rd international conference on Very large data bases, VLDB Endowment, pp 782–793

  • Yang Y, Papadias D, Papadopoulos S, Kalnis P (2009) Authenticated join processing in outsourced databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, ACM, pp 5–18

  • You I, Li J (2016) Special issue on security and privacy techniques in mobile cloud computing. J Ambient Intell Hum Comput 7(5):607–609

    Article  Google Scholar 

  • Yuan J, Yu S (2013) Flexible and publicly verifiable aggregation query for outsourced databases in cloud. In: Communications and network security (CNS), 2013 IEEE conference on, IEEE, pp 520–524

  • Zhang LF, Safavi-Naini R (2014) Verifiable delegation of computations with storage-verification trade-off. In: European symposium on research in computer security. Springer, Berlin, pp 112–129

  • Zhu Y, Ahn GJ, Hu H, Yau SS, An HG, Hu CJ (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227–238

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jamal Bentahar.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Eltayesh, F., Bentahar, J., Mizouni, R. et al. Refined game-theoretic approach to improve authenticity of outsourced databases. J Ambient Intell Human Comput 8, 329–344 (2017). https://doi.org/10.1007/s12652-017-0448-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-017-0448-x

Keywords

Navigation