Research on the Game Mechanism of Rational Outsourcing Database
Asian Journal of Mathematics and Computer Research, Volume 30, Issue 1,
While outsourcing databases are widely used, their security is also facing great challenges. In order to reduce the validation and communication overheads of outsourcing solutions, this paper designs a game mechanism for rational outsourcing databases based on game theory, setting incentives and defining a payoff matrix to ensure that each rational participant will only maintain an honest strategy so as not to contradict the self-interest nature and achieve a Nash equilibrium. Finally, through simulation experiments, this paper proves that the use of utility functions to secure data can reduce the user's verification overhead and communication overhead, which has important research value.
- Outsourcing database
- payoff matrix
- nash equilibrium
How to Cite
Hacigumus H, Iver B, Mehrotra S. Providing database as a service, International Conference on Data Engineering. Heidelberg. 2002;29-38.
Wang B, Li B, Li H. Oruta: privacy-preserving public auditing for shared data in the cloud ,International Conference on Cloud Computing. Dubai, 2012 Dubai. 2012;295-302.
Wang B, Li B, Li H. Public auditing for shared data with efficient user revocation in the cloud. IEEE International Conference on Computer Communications. Turin. 2013;2904-2912.
Ren DZ, Chen QG, Wang Y, Duan XR, Hao YJ, Wu XH. A spatial query verification method based on MIR trees. Computer Engineering. 2020;46(03):114-119+128.
Li Z, Lee KCK, Zheng B, et al. IR-tree: an efficient index for geographic document search. IEEE Transactions on Knowledge and Data Engineering. 2010;23(4):585-599.
Benabbas S, Gennaro R, Vahlis Y. Verifiable delegation of computation over large datasets. In: Proc. of the Annual Cryptology Conf. Berlin, Heidelberg: Springer-Verlag. 2011;111-131.
Halpen J, Teague V. Rational secret sharing and multiparty computation: extended abstract. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing. ACM. 2004;623-632.
Pham V, Khouzani MHR, Cid C. Optimal contracts for outsourced computation. in: Proc. of the Decision and Game Theory for Security (GameSec 2014). Cham: Springer-Verlag. 2014;79-98.
Vaidya J, Yakut I, Basu A. Efficient integrity verification for outsourced collaborative filtering. in: Proc. of the 2014 IEEE Int'l Conf. on Data Mining (ICDM). on Data Mining (ICDM). IEEE. 2014;560-569.
Tian YL, Ma JF, Peng CG, et al. Game-theoretic analysis for the secret sharing scheme. Acta Electronica Sinica. 2011;39(12):2790-2795.
Tian YL, Li QX. Research progress on rational cryptography protocol. Journal of Guizhou University: Natural Science Edition. 2018;3:14-23.
Feng Nengxian, Tian Youliang. A rational delegation computing protocol based on rational trust model. Journal of Software. 2021;32(06):1910-1922.
Osborne M. An introduction to game theory. New York: Oxford University Press; 2004.
Mehrdad N. Rational trust modeling. in: Proc. of the GameSec 2018. 2018;418-431.
Abstract View: 54 times
PDF Download: 5 times