Game theoretic modeling of security and trust relationship in cyberspace

被引:11
作者
Njilla, Laurent Yamen [1 ]
Pissinou, Niki [2 ]
Makki, Kia [3 ]
机构
[1] Florida Int Univ, Elect & Comp Engn, Miami, FL 33199 USA
[2] Florida Int Univ, Sch Comp & Informat Sci, Miami, FL 33199 USA
[3] Technol Univ Amer Coconut Creek, Sch Engn & Informat Technol, Coconut Creek, FL USA
关键词
game theory; online network services; privacy protection; trust; risk; security;
D O I
10.1002/dac.3115
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Today, online network services have evolved as the highest-emergent medium, enabling various online activities to be lucrative. However, these lucrative activities also bring new forms of privacy threats to the community. In a reliable e-business service, users should be able to trust the providers of the service to protect their customers' privacy. The service providers should not risk the personal and private information about their customers in cyberspace. There is an economic gain for a business provider when users trust the service provider. Despite those benefits, cyber security concern is the main reason some large organization may go bankrupted. Unfortunately, attackers may attempt to breach a provider's database and expose customers' private information. Therefore, in this paper, we propose a game theoretic framework for security and trust relationship in cyberspace for users, service providers, and attackers. Mathematical proofs and evaluations support our model. Service providers may use the model to see how important and dissuasive against attackers is when investing in cybersecurity. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:1500 / 1512
页数:13
相关论文
共 24 条
[11]  
Kim KyungKyu, 2009, Asia Pacific Journal of Information Systems, V19, P1
[12]  
Lilien L., 2008, TRADING PRIVACY TRUS
[13]  
Neuhaus S, 2012, WORKSH EC INF SEC WE
[14]  
Ntuen C, 2014, P IND SYST ENG RES C
[15]  
Pissinou N, 2015, IEEE COMPUTATIONAL I
[16]  
Raya M, 2010, WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P75
[17]   Making the Best Use of Cybersecurity Economic Models [J].
Rue, Rachel ;
Pfleeger, Shari Lawrence .
IEEE SECURITY & PRIVACY, 2009, 7 (04) :52-60
[18]  
Seigneur JM, 2004, LECT NOTES COMPUT SC, V2995, P93
[19]  
United States Securities and Exchanges Commission, 2011, CF DISCL GUID TOP 2
[20]   Incremental Integration of Land Use and Activity-Based Travel Modeling Workplace Choices and Travel Demand [J].
Wang, Liming ;
Waddell, Paul ;
Outwater, Maren L. .
TRANSPORTATION RESEARCH RECORD, 2011, (2255) :1-10