Using Game Theory to Secure Smart Contracts in Blockchain

被引:0
作者
Samanta, Ashis Kumar [1 ]
Chaki, Nabendu [1 ]
机构
[1] Univ Calcutta, Dept Comp Sci & Engn, Kolkata, India
来源
COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, CISIM 2024 | 2024年 / 14902卷
关键词
Data Security; Data Privacy; Game Theory; Smart Contract; Blockchain;
D O I
10.1007/978-3-031-71115-2_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The continuous improvement of internet technology invited many other technologies to integrate to solve different industrial and social problems. The utilization of clouds for data management of online transactions has become indispensable in the present digital world. The demand for cloud applications has been enhanced several times, even though the security threats to cloud data remain an unsolved issue. The smart contract running on blockchain framework is now being used in private, public, and industrial sectors. In the cloud environment, all user activities are divided into two types: honest operational and malicious activities. This, in turn, leads to serious security threats for the cloud system. In this paper, the security issues that arise due to the actions of honest and dishonest pools in the cloud are analyzed. The article tries to address the issues using non-cooperative games and find out the threshold values of the probability of an attack. The paper also defined the defensive user's state and the probability of building the system secure and risk-free smart contract execution.
引用
收藏
页码:47 / 59
页数:13
相关论文
共 11 条
[1]  
Adili Mohammad Taghi, 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P98, DOI 10.23919/INM.2017.7987269
[2]   Game Theoretic Modeling of Security and Interdependency in a Public Cloud [J].
Kamhoua, Charles A. ;
Kwiat, Luke ;
Kwiat, Kevin A. ;
Park, Joon S. ;
Zhao, Ming ;
Rodriguez, Manuel .
2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, :515-522
[3]   Cloud Data Auditing Techniques with a Focus on Privacy and Security [J].
Kolhar, Manjur ;
Abu-Alhaj, Mosleh M. ;
Abd El-atty, Saied M. .
IEEE SECURITY & PRIVACY, 2017, 15 (01) :42-51
[4]  
Malina L., 2015, J. appl. res. technol, V13, P20
[5]  
Mircea M., 2012, Int. J. Inf. Commun. Eng., V6, P798
[6]  
Samanta Ashis Kumar, 2021, 2021 International Conference on Data Analytics for Business and Industry (ICDABI), P683, DOI 10.1109/ICDABI53623.2021.9655810
[7]  
Sinjilawi Yousef K., 2014, Journal of Emerging Technologies in Web Intelligence, V6, P192, DOI 10.4304/jetwi.6.2.192-199
[8]   Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game [J].
Sun, Pan Jun .
SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
[9]   Evolutionary Game Analysis on Cloud Providers and Enterprises' Strategies for Migrating to Cloud-Native under Digital Transformation [J].
Zhang, Rui ;
Li, Yuewen ;
Li, Hongyan ;
Wang, Qiaosong .
ELECTRONICS, 2022, 11 (10)
[10]   Raising Awareness about Cloud Security in Industry through a Board Game [J].
Zhao, Tiange ;
Gasiba, Tiago ;
Lechner, Ulrike ;
Pinto-Albuquerque, Maria .
INFORMATION, 2021, 12 (11)