Game theoretic modeling of security and trust relationship in cyberspace

被引:11
作者
Njilla, Laurent Yamen [1 ]
Pissinou, Niki [2 ]
Makki, Kia [3 ]
机构
[1] Florida Int Univ, Elect & Comp Engn, Miami, FL 33199 USA
[2] Florida Int Univ, Sch Comp & Informat Sci, Miami, FL 33199 USA
[3] Technol Univ Amer Coconut Creek, Sch Engn & Informat Technol, Coconut Creek, FL USA
关键词
game theory; online network services; privacy protection; trust; risk; security;
D O I
10.1002/dac.3115
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today, online network services have evolved as the highest-emergent medium, enabling various online activities to be lucrative. However, these lucrative activities also bring new forms of privacy threats to the community. In a reliable e-business service, users should be able to trust the providers of the service to protect their customers' privacy. The service providers should not risk the personal and private information about their customers in cyberspace. There is an economic gain for a business provider when users trust the service provider. Despite those benefits, cyber security concern is the main reason some large organization may go bankrupted. Unfortunately, attackers may attempt to breach a provider's database and expose customers' private information. Therefore, in this paper, we propose a game theoretic framework for security and trust relationship in cyberspace for users, service providers, and attackers. Mathematical proofs and evaluations support our model. Service providers may use the model to see how important and dissuasive against attackers is when investing in cybersecurity. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1500 / 1512
页数:13
相关论文
共 24 条
[1]  
Alpcan T Ba_sar T., 2010, Network security: A decision and game-theoretic approach
[2]  
[Anonymous], 1997, Game Theory: Analysis of Conflict
[3]  
[Anonymous], 2012, Game Theory in Wireless and Communication Networks: Theory, Models, and Applications
[4]   A Trust Management based Security Mechanism against Collusion Attacks in a MANET Environment [J].
Douss, Aida Ben Chehida ;
Abassi, Ryma ;
El Fatmi, Sihem Guemara .
2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, :325-332
[5]  
Gintis H., 2000, GAM THEOR EV PROBL
[6]  
Han Y, 2013, P 4 INT C DEC GAM TH
[7]   Secure Time Synchronization in Wireless Sensor Networks: A Maximum Consensus-Based Approach [J].
He, Jianping ;
Chen, Jiming ;
Cheng, Peng ;
Cao, Xianghui .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (04) :1055-1065
[8]  
He W, 2008, P CSSE IEEE INT C WU, V3, P498
[9]   Friend-in-the-Middle Attacks Exploiting Social Networking Sites for Spam [J].
Huber, Markus ;
Mulazzani, Martin ;
Kitzler, Gerhard ;
Goluch, Sigrun ;
Weippl, Edgar .
IEEE INTERNET COMPUTING, 2011, 15 (03) :28-34
[10]   Game Theoretic Modeling of Security and Interdependency in a Public Cloud [J].
Kamhoua, Charles A. ;
Kwiat, Luke ;
Kwiat, Kevin A. ;
Park, Joon S. ;
Zhao, Ming ;
Rodriguez, Manuel .
2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, :515-522