2021
DOI: 10.1007/978-3-030-76508-8_24
|View full text |Cite|
|
Sign up to set email alerts
|

Game Theoretic Approaches to Mitigate Cloud Security Risks: An Initial Insight

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 38 publications
0
0
0
Order By: Relevance
“…Although shared infrastructure and multitenancy are improving the redundancy and reliability of the cloud, users have limited visibility and control over online business data and applications. As a direct result of these virtualized services, data security is still a critical challenge in the cloud computing paradigm, and it becomes particularly serious because the data are located in diferent virtual machines (VMs) [4,5]. One major problem with cloud security is that attackers can inject malicious queries using various cyberattacks such as credential stufng, Denial of service (DoS), Spectre and Meltdown, SQL injection, Cross-Site Scripting (XSS), CrossSite Request Forgery (CSRF), etc [6].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Although shared infrastructure and multitenancy are improving the redundancy and reliability of the cloud, users have limited visibility and control over online business data and applications. As a direct result of these virtualized services, data security is still a critical challenge in the cloud computing paradigm, and it becomes particularly serious because the data are located in diferent virtual machines (VMs) [4,5]. One major problem with cloud security is that attackers can inject malicious queries using various cyberattacks such as credential stufng, Denial of service (DoS), Spectre and Meltdown, SQL injection, Cross-Site Scripting (XSS), CrossSite Request Forgery (CSRF), etc [6].…”
Section: Introductionmentioning
confidence: 99%
“…(1) We identify and quantify potential security threats in cloud computing environments to build a cybersecurity model (2) We use Stackelberg games to model the attackerdefender strategic interaction in cloud computing, especially when using a limited number of resources (3) We develop a model of imperfect competition based on a noncooperative game to fnd an optimal defender strategy (4) We propose a model of bounded rationality based on the QRE so that all players always make their decisions with a limited amount of information about security threats and countermeasures (5) We conduct a comprehensive evaluation of the accuracy of the modeling defense strategy and its efect on the operating proft margin Te rest of this paper is structured as follows. In Section 2, we formalized the system model and security requirements for cloud-shared resources.…”
Section: Introductionmentioning
confidence: 99%