Refined game-theoretic approach to improve authenticity of outsourced databases

被引:2
|
作者
Eltayesh, Faryed [1 ]
Bentahar, Jamal [1 ]
Mizouni, Rabeb [2 ]
Otrok, Hadi [2 ]
Shakshuki, Elhadi [3 ]
机构
[1] Concordia Univ, CIISE, Montreal, PQ, Canada
[2] Khalifa Univ, Elect & Comp Engn, Abu Dhabi, U Arab Emirates
[3] Acadia Univ, Jodrey Sch Comp Sci, Wolfville, NS, Canada
关键词
Verifiable database; Outsourced database security; Authenticated data structures; Database auditing; DIGITAL-SIGNATURES; SECURITY;
D O I
10.1007/s12652-017-0448-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The verifiable database (VDB) model is characterized by the fact that the database owner, a computationally weak client, delegates the database management to a database service provider on the cloud, which is considered untrusted third party. In this model, users can query the data and verify the integrity of query results. Motivated by the desire to reduce the computational cost and communication overhead of such a verification process, and to support sophisticated query types, such as aggregated queries, some recent VDB approaches used randomized periodic verifications. These new approaches dedicate a new entity called verifier, whose responsibility is to perform the verification process instead of database users. To improve the randomization effectiveness of the verification operations, our previous work has employed game theory and modeled the VDB problem as a leader-follower Stackelberg security game. The model aimed to randomize what database tables to verify at each verification moment. The main problem of this work is its limitation to only one attacker type, which limits its deployment in real and open cloud environments. In this paper, we extend and refine the Stackelberg security game to be a Bayesian security game which further optimizes the mixed strategy of the verifier by considering multiple follower types. Moreover, we analyze the need for randomization of verification moments and identify the best method allowing us to achieve this randomization. Furthermore, we describe and discuss in detail the implementation settings of each component involved in the model. We have implemented and tested the performance of the Bayesian game model against the single follower-type model and the uniform randomization model. Experiment results show that the Bayesian game model performs better when dealing with multiple attacker types.
引用
收藏
页码:329 / 344
页数:16
相关论文
共 50 条
  • [1] Refined game-theoretic approach to improve authenticity of outsourced databases
    Faryed Eltayesh
    Jamal Bentahar
    Rabeb Mizouni
    Hadi Otrok
    Elhadi Shakshuki
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2017, 8 : 329 - 344
  • [2] A Game-Theoretic Approach to Improve Energy-Related Data
    Al-Gharbi, Salem
    Al-Majed, Abdulaziz
    Mahmoud, Mohamed
    Abdulraheem, Abdulazeez
    [J]. ACS OMEGA, 2022, 7 (19): : 16785 - 16792
  • [3] Overbuilding: A game-theoretic approach
    Wang, K
    Zhou, YQ
    [J]. REAL ESTATE ECONOMICS, 2000, 28 (03) : 493 - 522
  • [4] Desuetudo: A Game-Theoretic Approach
    Faroldi, Federico L. G.
    [J]. ARCHIV FUR RECHTS- UND SOZIALPHILOSOPHIE, 2021, 107 (02): : 289 - 299
  • [5] A GAME-THEORETIC APPROACH TO NETWORK EQUILIBRIUM
    HAURIE, A
    MARCOTTE, P
    [J]. MATHEMATICAL PROGRAMMING STUDY, 1986, 26 : 252 - 255
  • [6] A game-theoretic approach to decision in FDI
    Darkhovski, B
    Staroswiecki, M
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2003, 48 (05) : 853 - 858
  • [7] A Game-Theoretic Approach to Graph Clustering
    Mandala, Supreet
    Kumara, Soundar
    Chatterjee, Kalyan
    [J]. INFORMS JOURNAL ON COMPUTING, 2014, 26 (03) : 629 - 643
  • [8] ALOHA networks: a game-theoretic approach
    Marban, Sebastian
    van de Ven, Peter
    Borm, Peter
    Hamers, Herbert
    [J]. MATHEMATICAL METHODS OF OPERATIONS RESEARCH, 2013, 78 (02) : 221 - 242
  • [9] Security in Networks: A Game-Theoretic Approach
    Gueye, Assane
    Walrand, Jean C.
    [J]. 47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 829 - 834
  • [10] Trading the Cloud: A Game-Theoretic Approach
    Zheng, Xianrong
    [J]. AMCIS 2020 PROCEEDINGS, 2020,