Abstract
The verifiable database (VDB) model is characterized by the fact that the database owner, a computationally weak client, delegates the database management to a database service provider on the cloud, which is considered untrusted third party. In this model, users can query the data and verify the integrity of query results. Motivated by the desire to reduce the computational cost and communication overhead of such a verification process, and to support sophisticated query types, such as aggregated queries, some recent VDB approaches used randomized periodic verifications. These new approaches dedicate a new entity called verifier, whose responsibility is to perform the verification process instead of database users. To improve the randomization effectiveness of the verification operations, our previous work has employed game theory and modeled the VDB problem as a leader–follower Stackelberg security game. The model aimed to randomize what database tables to verify at each verification moment. The main problem of this work is its limitation to only one attacker type, which limits its deployment in real and open cloud environments. In this paper, we extend and refine the Stackelberg security game to be a Bayesian security game which further optimizes the mixed strategy of the verifier by considering multiple follower types. Moreover, we analyze the need for randomization of verification moments and identify the best method allowing us to achieve this randomization. Furthermore, we describe and discuss in detail the implementation settings of each component involved in the model. We have implemented and tested the performance of the Bayesian game model against the single follower-type model and the uniform randomization model. Experiment results show that the Bayesian game model performs better when dealing with multiple attacker types.
Similar content being viewed by others
References
AlShahwan F, Faisal M, Ansa G (2016) Security framework for restful mobile cloud computing web services. J Ambient Intell Hum Comput 7(5):649–659
An B, Tambe M, Ordonez F, Shieh EA, Kiekintveld C (2011) Refinement of strong Stackelberg equilibria in security games. In: AAAI
Chen X, Li J, Weng J, Ma J, Lou W (2014) Verifiable computation over large database with incremental updates. In: European symposium on research in Computer Security. Springer, Berlin, pp 148–162
Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Secure Comput 12(5):546–556
Devanbu P, Gertz M, Martel C, Stubblebine SG (2002) Authentic third-party data publication. In: Data and application security. Springer, Berlin, pp 101–112
Eltayesh F, Bentahar J (2016) Verifiable outsourced database in the cloud using game theory. In: Proceedings of the 32nd ACM SIGAPP symposium On applied computing, ACM, Accepted
Goodrich MT, Tamassia R, Triandopoulos N (2008) Super-efficient verification of dynamic outsourced databases. In: Topics in cryptology–CT-RSA 2008. Springer, Berlin, pp 407–424
Kiraz MS (2016) A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J Ambient Intell Hum Comput 7(5):731–760
Korzhyk D, Conitzer V, Parr R (2010) Complexity of computing optimal Stackelberg strategies in security resource allocation games. In: AAAI
Ma D, Deng RH, Pang H, Zhou J (2005) Authenticating query results in data publishing. In: International conference on information and communications security. Springer, Berlin, pp 376–388
Merkle RC (1989) A certified digital signature. In: Conference on the theory and application of cryptology. Springer, Berlin, pp 218–238
M’hamdi MA, Bentahar J (2012) Scheduling reputation maintenance in agent-based communities using game theory. J Softw 7(7):1514–1523
Mykletun E, Narasimha M, Tsudik G (2003) Providing authentication and integrity in outsourced databases using merkle hash trees. UCI-SCONCE Technical Report
Mykletun E, Narasimha M, Tsudik G (2006) Authentication and integrity in outsourced databases. ACM Trans Storage (TOS) 2(2):107–138
Narasimha M, Tsudik G (2005) Dsac: integrity for outsourced databases with signature aggregation and chaining. In: Proceedings of the 14th ACM international conference on Information and knowledge management, ACM, pp 235–236
Narasimha M, Tsudik G (2006) Authentication of outsourced databases using signature aggregation and chaining. In: International conference on database systems for advanced applications. Springer, Berlin, pp 420–436
Pang H, Zhang J, Mouratidis K (2009) Scalable verification for outsourced dynamic databases. Proc VLDB Endow 2(1):802–813
Papamanthou C, Tamassia R (2007) Time and space efficient algorithms for two-party authenticated data structures. In: International conference on information and communications security. Springer, Berlin, pp 1–15
Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008a) Efficient algorithms to solve Bayesian Stackelberg games for security applications. In: Proc of AAAI, pp 1559–1562
Paruchuri P, Pearce JP, Marecki J, Tambe M, Ordonez F, Kraus S (2008b) Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems-Volume 2, International foundation for autonomous agents and multiagent systems, pp 895–902
Pita J, Jain M, Marecki J, Ordóñez F, Portway C, Tambe M, Western C, Paruchuri P, Kraus S (2008) Deployed armor protection: the application of a game theoretic model for security at the los angeles international airport. In: Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: industrial track, international foundation for autonomous agents and multiagent systems, pp 125–132
Pointcheval D, Stern J (2000) Security arguments for digital signatures and blind signatures. J Cryptol 13(3):361–396
Rivest RL, Shamir A, Adleman L (1978) A method for obtaining digital signatures and public-key cryptosystems. Commun ACM 21(2):120–126
Thompson B, Haber S, Horne WG, Sander T, Yao D (2009) Privacy-preserving computation and verification of aggregate queries on outsourced databases. In: International symposium on privacy enhancing technologies symposium. Springer, Berlin, pp 185–201
Von Stackelberg H (1934) Marktform und gleichgewicht. Springer
Wahab OA, Bentahar J, Otrok H, Mourad A (2016) A Stackelberg game for distributed formation of business-driven services communities. Expert Syst Appl 45:359–372
Wang J, Chen X, Huang X, You I, Xiang Y (2015) Verifiable auditing for outsourced database in cloud computing. IEEE Trans Comput 64(11):3293–3303
Xie M, Wang H, Yin J, Meng X (2007) Integrity auditing of outsourced data. In: Proceedings of the 33rd international conference on Very large data bases, VLDB Endowment, pp 782–793
Yang Y, Papadias D, Papadopoulos S, Kalnis P (2009) Authenticated join processing in outsourced databases. In: Proceedings of the 2009 ACM SIGMOD international conference on management of data, ACM, pp 5–18
You I, Li J (2016) Special issue on security and privacy techniques in mobile cloud computing. J Ambient Intell Hum Comput 7(5):607–609
Yuan J, Yu S (2013) Flexible and publicly verifiable aggregation query for outsourced databases in cloud. In: Communications and network security (CNS), 2013 IEEE conference on, IEEE, pp 520–524
Zhang LF, Safavi-Naini R (2014) Verifiable delegation of computations with storage-verification trade-off. In: European symposium on research in computer security. Springer, Berlin, pp 112–129
Zhu Y, Ahn GJ, Hu H, Yau SS, An HG, Hu CJ (2013) Dynamic audit services for outsourced storages in clouds. IEEE Trans Serv Comput 6(2):227–238
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Eltayesh, F., Bentahar, J., Mizouni, R. et al. Refined game-theoretic approach to improve authenticity of outsourced databases. J Ambient Intell Human Comput 8, 329–344 (2017). https://doi.org/10.1007/s12652-017-0448-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-017-0448-x