Game theory approach in decision-making to invest in modules

نوع مقاله : مقاله پژوهشی

نویسندگان

گروه مهندسی کامپیوتر، دانشکده مهندسی برق و کامپیوتر، دانشگاه کاشان، کاشان، ایران.

چکیده

Cloud computing involves a variety of technologies, including networking and virtualization, to meet the new needs of users, but is vulnerable to many security threats. To provide the necessary level of security in cloud computing, decision-making on the type and number of security modules used by cloud service users and then paying the relevant fees is of particular importance. Game theory, with the ability to model the behavior of users and attackers of a supervisor and analyze the possible strategy and profitability of each, can suggest a suitable strategy for investing in the security modules of a virtual machine. In our previous work, we used game theory to analyze the decision to invest in one of the security modules for each of the actors. The purpose of this paper is to study the effect of the three parameters "different investment costs", "probability of success of the attack on the user" and "probability of success of the attack on the supervisor" and to make an appropriate decision in this situation. Based on the simulation results, it can be said that given the different values of the probability of a successful attack on a supervisor, a predetermined investment can lead to a proper Nash equilibrium. In general, at low costs or in the case of increasing the cost of investing in security, the user tends to constantly change his strategy and provide the desired security conditions. The results also show that as the probability of a successful attack on a user not investing in security increases, so does the security investment cost.

کلیدواژه‌ها

موضوعات


عنوان مقاله [English]

Game theory approach in decision-making to invest in modules

نویسندگان [English]

  • Amir-Hossein Yadollahi
  • Salman Goli Bidgoli
Department of Computer Engineering, Faculty of Electrical and Computer Engineering, University of Kashan, Kashan, Iran.
چکیده [English]

Cloud computing involves a variety of technologies, including networking and virtualization, to meet the new needs of users, but is vulnerable to many security threats. To provide the necessary level of security in cloud computing, decision-making on the type and number of security modules used by cloud service users and then paying the relevant fees is of particular importance. Game theory, with the ability to model the behavior of users and attackers of a supervisor and analyze the possible strategy and profitability of each, can suggest a suitable strategy for investing in the security modules of a virtual machine. In our previous work, we used game theory to analyze the decision to invest in one of the security modules for each of the actors. The purpose of this paper is to study the effect of the three parameters "different investment costs", "probability of success of the attack on the user" and "probability of success of the attack on the supervisor" and to make an appropriate decision in this situation. Based on the simulation results, it can be said that given the different values of the probability of a successful attack on a supervisor, a predetermined investment can lead to a proper Nash equilibrium. In general, at low costs or in the case of increasing the cost of investing in security, the user tends to constantly change his strategy and provide the desired security conditions. The results also show that as the probability of a successful attack on a user not investing in security increases, so does the security investment cost.

کلیدواژه‌ها [English]

  • Cloud Computing
  • Investing in Security
  • Game Theory
  • Repeated Game
[1] T. Shabeera, S. Madhu Kumar, S. M. Salam, and K. Murali Krishnan, “Optimizing vm allocation and data placement for data-intensive applications in cloud using aco metaheuristic algorithm,” Eng. Sci. Technol. Int. J., vol. 20, no. 2, pp. 616–628, 2017, doi: 10.1016/j.jestch.2016.11.006.
[2] M. K. Sasubilli and V. R, “Cloud computing security challenges, threats and vulnerabilities,” in 6th International Conference on Inventive Computation Technologies (ICICT), 2021, pp. 476–480, doi: 10.1109/ICICT50816.2021.9358709.
[3] B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, “A systematic literature review on cloud computing security: Threats and mitigation strategies,” IEEE Access, vol. 9, pp. 57 792–57 807, 2021, doi: 10.1109/ACCESS.2021.3073203.
[4] R. Sharma, M. K. Gourisaria, and S. S. Patra, “Cloud computing—security, issues, and solutions,” in Communication Software and Networks, S. C. Satapathy, V. Bhateja, M. Ramakrishna Murty, N. Gia Nhu, and J. Kotti, Eds. Singapore: Springer Singapore, 2021, pp. 687–700.
[5] B. O. Sané, C. S. M. Babou, and I. Niang, “A game theoretic approach for virtual machine allocation security in cloud computing,” in Proceedings of the 2nd International Conference on Networking, Information Systems & Security, NISS 2019, Rabat, Morocco, B. Abouelmajd, M. B. Ahmed, A. A. Boudhir, and H. E. Ghazi, Eds. ACM, 2019, pp. 47:1–47:6, doi: 10.1145/3320326.3320379.
[6] K. Prabhakar, K. Dutta, R. Jain, M. Sharma, and S. K. Khatri, “Securing virtual machines on cloud through game theory approach,” in Amity International Conference on Artificial Intelligence (AICAI), 2019, pp. 859–863, doi: 10.1109/AICAI.2019.8701229.
[7] C.-S. Lee, “Multi-objective game-theory models for conflict analysis in reservoir watershed management,” Chemosphere, vol. 87, no. 6, pp. 608–613, 2012, doi: 10.1016/j.chemosphere.2012.01.014.
[8] V. Kakkad, H. Shah, R. Patel, and N. Doshi, “A comparative study of applications of game theory in cyber security and cloud computing.” Proc. Comput. Sci., vol. 155, pp. 680–685, 2019, doi: 10.1016/j.procs.2019.08.097.
[9] L. Kwiat, C. A. Kamhoua, K. A. Kwiat, and J. Tang, Risks and Benefits: Game-Theoretical Analysis and Algorithm for Virtual Machine Security Management in the Cloud. John Wiley & Sons, Ltd, 2018, ch. 3, pp. 49–80, doi: 10.1002/9781119428497.ch3.
[10] A.-H. Yadollahi, J. Salimi-Sartaghti, and S. Goli Bidgoli, “Modeling the security of virtual machines in the cloud using iterative game theory,” Soft Comput. J., vol. 10, no. 1, pp. 2–15, 2021, doi: 10.22052/scj.2021.242842.0 [In Persian].
[11] S. Razzaghzadeh, P. Norouzi Kivi, and B. Panahi, “A hybrid algorithm based on gossip architecture using svm for task scheduling in cloud computing,” Soft Comput. J., vol. 9, no. 2, pp. 84–93, 2021, doi: 10.22052/scj.2021.242822.0 [In Persian].
[12] E. Asadollahi and S. A. Asghari, “Prediction of appropriate number of virtual machines based on time series and artificial methods via virtual machines clustering,” Soft Comput. J., vol. 6, no. 1, pp. 66–77, 2017, [In Persian].