• Home
  • Register
  • Login

Asian Journal of Mathematics and Computer Research

  • About
    • About the Journal
    • Submissions & Author Guidelines
    • Articles in Press
    • Editorial Team
    • Editorial Policy
    • Publication Ethics and Malpractice Statement
    • Contact
  • Archives
  • Indexing
  • Submission
Advanced Search
  1. Home
  2. Archives
  3. 2023 - Volume 30 [Issue 1]
  4. Original Research Article

Author Guidelines


Submit Manuscript


Editorial Board Member


Research on the Game Mechanism of Rational Outsourcing Database

  •   Li Liu

Asian Journal of Mathematics and Computer Research, Volume 30, Issue 1, Page 26-32
DOI: 10.56557/ajomcor/2023/v30i18165
Published: 20 March 2023

  • View Article
  • Download
  • Cite
  • References
  • Statistics
  • Share

Abstract


While outsourcing databases are widely used, their security is also facing great challenges. In order to reduce the validation and communication overheads of outsourcing solutions, this paper designs a game mechanism for rational outsourcing databases based on game theory, setting incentives and defining a payoff matrix to ensure that each rational participant will only maintain an honest strategy so as not to contradict the self-interest nature and achieve a Nash equilibrium. Finally, through simulation experiments, this paper proves that the use of utility functions to secure data can reduce the user's verification overhead and communication overhead, which has important research value.

Keywords:
  • Outsourcing database
  • payoff matrix
  • nash equilibrium
  • PDF Requires Subscription or Fee (USD 30)

How to Cite

Liu, L. (2023). Research on the Game Mechanism of Rational Outsourcing Database. Asian Journal of Mathematics and Computer Research, 30(1), 26–32. https://doi.org/10.56557/ajomcor/2023/v30i18165
  • ACM
  • ACS
  • APA
  • ABNT
  • Chicago
  • Harvard
  • IEEE
  • MLA
  • Turabian
  • Vancouver
  • Endnote/Zotero/Mendeley (RIS)
  • BibTeX

References

Hacigumus H, Iver B, Mehrotra S. Providing database as a service, International Conference on Data Engineering. Heidelberg. 2002;29-38.

Wang B, Li B, Li H. Oruta: privacy-preserving public auditing for shared data in the cloud ,International Conference on Cloud Computing. Dubai, 2012 Dubai. 2012;295-302.

Wang B, Li B, Li H. Public auditing for shared data with efficient user revocation in the cloud. IEEE International Conference on Computer Communications. Turin. 2013;2904-2912.

Ren DZ, Chen QG, Wang Y, Duan XR, Hao YJ, Wu XH. A spatial query verification method based on MIR trees. Computer Engineering. 2020;46(03):114-119+128.

Li Z, Lee KCK, Zheng B, et al. IR-tree: an efficient index for geographic document search. IEEE Transactions on Knowledge and Data Engineering. 2010;23(4):585-599.

Benabbas S, Gennaro R, Vahlis Y. Verifiable delegation of computation over large datasets. In: Proc. of the Annual Cryptology Conf. Berlin, Heidelberg: Springer-Verlag. 2011;111-131.

Halpen J, Teague V. Rational secret sharing and multiparty computation: extended abstract. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing. ACM. 2004;623-632.

Pham V, Khouzani MHR, Cid C. Optimal contracts for outsourced computation. in: Proc. of the Decision and Game Theory for Security (GameSec 2014). Cham: Springer-Verlag. 2014;79-98.

Vaidya J, Yakut I, Basu A. Efficient integrity verification for outsourced collaborative filtering. in: Proc. of the 2014 IEEE Int'l Conf. on Data Mining (ICDM). on Data Mining (ICDM). IEEE. 2014;560-569.

Tian YL, Ma JF, Peng CG, et al. Game-theoretic analysis for the secret sharing scheme. Acta Electronica Sinica. 2011;39(12):2790-2795.

Tian YL, Li QX. Research progress on rational cryptography protocol. Journal of Guizhou University: Natural Science Edition. 2018;3:14-23.

Feng Nengxian, Tian Youliang. A rational delegation computing protocol based on rational trust model. Journal of Software. 2021;32(06):1910-1922.

Osborne M. An introduction to game theory. New York: Oxford University Press; 2004.

Mehrdad N. Rational trust modeling. in: Proc. of the GameSec 2018. 2018;418-431.

  • Abstract View: 54 times
    PDF Download: 5 times

Download Statistics

Downloads

Download data is not yet available.
  • Linkedin
  • Twitter
  • Facebook
  • WhatsApp
  • Telegram

Current Issue

  • Atom logo
  • RSS2 logo
  • RSS1 logo

Subscription

Login to access subscriber-only resources.

Information

  • For Readers
  • For Authors
  • For Librarians


Terms & Condition | Privacy Policy | Help | Team | Advertising Policy
Copyright @ 2000-2021 I.K. Press. All rights reserved.