a method for user data protection based on game theory...

7
A Method for User Data Protection Based on Game Theory in Cloud Computing Xiaohui Li 1 , Feng Liu 2 , Hongxing Liang 3 1 College of Electrical and Information Engineer, Liaoning University of Technology Jinzhou, Liaoning, 121001, China 2 Shenyang institute of computing technology, Chinese academy of sciences Shenyang, Liaoning, 110168, China 3 Jinzhou 65631 Force, Jinzhou, Liaoning 121001, China 1 [email protected] Abstract. To protect the security of user data and a safe, controlled service ac- quisition as the goal, we propose a game service acquisition method which combines trust evaluation with decision management application, designing us- er-centric data protection restraint mechanisms with mechanism design theory. The method includes user information, trust management, service discovery, service management and revenue information function module. Trust reconciles contradiction between user data protection and cloud services honest offering so that both sides of service reach the perfect Bayesian Nash equilibrium strategies to promote the honest service implementation. Keywords: cloud computing; game theory; data protection 1 Introduction Cloud computing environments due to their specific service delivery exist between cloud users and cloud services with data transfer of ownership, the separation of own- ership and control of data, this competitive relationship with economic phenomena have similarities. Therefore, this paper attempts to use game theory and other related tools to solve the corresponding problem. In the cloud service interaction process, cloud users trust evaluation of cloud services, cloud users when faced with multiple service resources, it will be trusted to assess the behavior of their services, if the as- sessment of credibility, then choose to submit a request, otherwise select other ser- vices, empathy cloud services cloud users have to make trust assessments to ensure the safety of the service side, consider cloud from the perspective of the user data protection point of this program is mainly focused on cloud services cloud users trust management. We will interact with the service cloud computing environments as cloud game problems between users and cloud services, cloud services from the per- spective of trust evaluation interaction, trust cloud services as a measure of the benefit or payment game party, demonstrate cloud cloud computing environment customer service requests and cloud services is a dynamic game of incomplete information. Game cloud service model proposed acquisition, the program to achieve cloud data Advanced Science and Technology Letters Vol.143 (AST 2017), pp.16-22 http://dx.doi.org/10.14257/astl.2017.143.04 ISSN: 2287-1233 ASTL Copyright © 2017 SERSC

Upload: buidien

Post on 30-Jul-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

A Method for User Data Protection Based on Game

Theory in Cloud Computing

Xiaohui Li1, Feng Liu2, Hongxing Liang 3

1College of Electrical and Information Engineer, Liaoning University of Technology

Jinzhou, Liaoning, 121001, China 2Shenyang institute of computing technology, Chinese academy of sciences

Shenyang, Liaoning, 110168, China 3Jinzhou 65631 Force, Jinzhou, Liaoning 121001, China

[email protected]

Abstract. To protect the security of user data and a safe, controlled service ac-

quisition as the goal, we propose a game service acquisition method which

combines trust evaluation with decision management application, designing us-

er-centric data protection restraint mechanisms with mechanism design theory.

The method includes user information, trust management, service discovery,

service management and revenue information function module. Trust reconciles

contradiction between user data protection and cloud services honest offering so

that both sides of service reach the perfect Bayesian Nash equilibrium strategies

to promote the honest service implementation.

Keywords: cloud computing; game theory; data protection

1 Introduction

Cloud computing environments due to their specific service delivery exist between

cloud users and cloud services with data transfer of ownership, the separation of own-

ership and control of data, this competitive relationship with economic phenomena

have similarities. Therefore, this paper attempts to use game theory and other related

tools to solve the corresponding problem. In the cloud service interaction process,

cloud users trust evaluation of cloud services, cloud users when faced with multiple

service resources, it will be trusted to assess the behavior of their services, if the as-

sessment of credibility, then choose to submit a request, otherwise select other ser-

vices, empathy cloud services cloud users have to make trust assessments to ensure

the safety of the service side, consider cloud from the perspective of the user data

protection point of this program is mainly focused on cloud services cloud users trust

management. We will interact with the service cloud computing environments as

cloud game problems between users and cloud services, cloud services from the per-

spective of trust evaluation interaction, trust cloud services as a measure of the benefit

or payment game party, demonstrate cloud cloud computing environment customer

service requests and cloud services is a dynamic game of incomplete information.

Game cloud service model proposed acquisition, the program to achieve cloud data

Advanced Science and Technology Letters Vol.143 (AST 2017), pp.16-22

http://dx.doi.org/10.14257/astl.2017.143.04

ISSN: 2287-1233 ASTL Copyright © 2017 SERSC

security and user privacy protection as the goal, trust management focus, trust mecha-

nisms by providing customized protection services on demand cloud users on this

basis. Game theory is used to establish trust between cloud users and cloud services,

trust services based on both the refined Bayesian Nash equilibrium strategies designed

to promote service integrity cooperation incentives.

The rest of this paper is organized as follows. In Section 2, we analysis Game rela-

tionship in the cloud environment and related information. In Section 3, we details the

method design in two aspects: one is to design ideas and the other is specific program.

We also give a specific module implementation for better illustration of our method.

Finally, we conclude this paper in Section 4.

2 Cloud Service Game Analysis

2.1 Game Theory

Game theory began in 1944 by Von Neumann and Oskar Morgenstern in cooperation

with the publication of "Game Theory and Economic Behavior". Nash and Tucker in

the 1950s, published an article on the definition and existence of equilibrium, and

proposed a "prisoner's dilemma", both of which work laid the cornerstone of the non-

cooperative game theory [1-4]. Game theory is a problem with this decision and bal-

anced decision-making body of behavioral research more interaction with each other,

which emphasizes the interdependence of the parties to the policy decision-making

Any one subject must determine their own optimal strategy considering other subjects

on the basis of selection strategy. In this sense, game theory is also known as "game

theory." Game theory is the essence of the subject must be considered the basis of

other body reactions up to choose their own course of action, the results of the game

is to produce a balanced, balanced combination of all people who participate in the

optimal strategy or action.

The main problem in game theory is the study participants with independent inter-

ests and rational basis, under certain rule conditions, predict the behavior of other

participants and the results of their behavior types (such as cooperation, betrayal, etc.)

obtained by comparing, and then decide what action strategies, and ultimately achieve

an equilibrium solution of mutual restraint.

2.2 Mechanism Design Theory

Mechanism design theory study under freedom of choice, the conditions of incom-

plete information, design a theoretical mechanism to achieve the objectives set, which

can be seen as the integrated use of game theory and social choice theory. In other

word, the mechanism designs to provide an incentive to choose their own private in-

formation members of society problem analytical framework to consider what kind of

game in the form of construction, making the solution of this game is that social

Advanced Science and Technology Letters Vol.143 (AST 2017)

Copyright © 2017 SERSC 17

goals. Social goals here refers to the selection result of the entire social groups, by the

players choice by expressing their preferences concluded that the results will in turn

affect the choice of each individual players, if the result is a society of social choice

result set, places Multi-functions social choice rule indicates [5-8].

2.3 Dynamic Service Game Analysis

Cloud computing is a huge cloud service network composed by a parallel grid, com-

puting power through virtualization technology extension service cloud. Front-end

user interface permits the user to select the service through the service catalog, service

request and after verification by the system manager to find alternative service re-

sources to select a service in the cloud resource is then provided by the service tool

[9]. Cloud computing system logical structure shown in Figure 1.

In the cloud computing service interaction environments, from between the cloud

user data security and privacy protection angle cloud users and cloud services there

are different interests and needs: Cloud user as a cloud service requester, choose a

trusted service provider, protection while their rights to obtain services revenue; cloud

services as a service provider is to provide the amount of its income. Both hope to

eventually achieve a balanced state of mutual restraint results in providing infor-

mation and services to get the room, so the interactive services cloud computing envi-

ronment is the behavior of both sides of the game.

...

System Management

Monitoring and

Statistics

User interface

Services Directory

Fig. 1. Cloud computing system logical structure

3. Method Design

In a cloud computing environment cloud user data protection security program pri-

marily consists of two parts: the trust evaluation and trust-based decision management.

The main job is to assess the safety of trust from the cloud services provided to de-

Advanced Science and Technology Letters Vol.143 (AST 2017)

18 Copyright © 2017 SERSC

scribe the relationship and trust quantify cloud computing environment of trust; Deci-

sion management mainly work is service options based on trust, including service dis-

covery, selection and delivery of user data with trusted cloud balance relationship be-

tween the user and the service to obtain the release of data for controllable cloud ser-

vices. To protect the security of user data cloud to cloud services provide a safe and

controlled as the goal, the trust portfolio assessment and decision management applica-

tion, designed to promote the application of mechanism design theory for data protec-

tion in the cloud user restraint mechanism center.

3.1 Design Ideas

In the course of cloud computing environments in interactive services, cloud users

what kind of approach allows to provide a safe and reliable cloud services, safety and

security of user data is the core problem. Cloud users as a resource owner, cloud ser-

vices as a controller of resources, in this sense we principal economics - agent theory

to analyze the interaction occurring in the course of service problems and solutions,

problems include interest conflict and asymmetric information.Trust in the cloud-

based service acquisition for analysis, used to calculate the credibility and trust cloud

services directly belong to the history of trust and other information prior information

on cloud services cloud user feedback evaluation belong posteriori information. trust

based service interaction Game process as shown in Figure 2:

Cloud services directly trust

Cloud Services recommendation

trust

Cloud Services Trust

quantification

Service Selection

Service Discovery

Service behavior feedback

Dynamic Decision

Priori information

Posteriori information

Correction of Information

Fig. 2. Service selection game information based on trust

3.2 Cloud Users Data Protection Method based on Game

In a cloud computing environment to the cloud computing user demand for services -

safe and controlled as a starting point, to trust the main line, the introduction of the

Advanced Science and Technology Letters Vol.143 (AST 2017)

Copyright © 2017 SERSC 19

game and restraint mechanisms proposed cloud user data protection solutions. The

scenario in the game under restraint mechanism, so that the integrity of the service

provider to implement cloud services, through the cloud service node trust evaluation,

both for service interaction and user security decisions to provide more detailed and

accurate basis.

(1) Information Management: including a priori and a posteriori information man-

agement information, feedback and historical behavior is mainly historical service

management cloud services provide statistical and other information, is updated via

the information corrected cloud user services provide the basis for selection;

(2) Service Trust Evaluation: First cloud users describe the service description

trust, trust quantification of cloud services based on a priori information;

(3) Service selection: trust-based service discovery and service selection, as a cloud

user's final earnings;

(4) User Data Delivery: User data disclosure mode based on trust, the introduction

of trust threshold concept triggering cloud service constraints and incentives.

(5) Cloud User Decision Management: service selection and user data delivery, in

the process of service game interative, cloud users according to Decision Manage-

ment make the choice of trust threshold and trust management results to deliver data,

triggering cloud services restraint mechanism, dynamic management service trust

value.

In a cloud computing environment, there are between cloud users interact with

cloud services over the game, after the process may never again their choice, called

the basic game, if we choose the cloud service is called repeated games, repeated

games behavior and results are not necessarily duplicate the basic game is simple,

because the information side of the game will return information changes, so that the

choice game behavior is affected. In repeated games, if fraud occurs, the game pro-

cess will thus loss of revenue, so participants must fully consider the long-term bene-

fits, rather than choose immediate. In this case, the two sides will conduct cooperation

agreement on the formation of constraints. In repeated games, punishment mechanism

is often used to trigger strategies, both players find each other once the first tentative

cooperation fraudulent or malicious behavior, you are no longer together. Therefore,

according to the punishment trigger strategies can contribute to long-term choice be-

tween nodes acts to maintain the integrity of the biggest benefits of cooperation.

Cloud services are the actors, it is a rational choice of strategy, seeking to maximize

returns. Compliance triggering policy, when a malicious service provider, the cooper-

ation will always terminate that application posteriori information feedback, correc-

tion of the assessed value of the trust cloud services or increase their choice of trust

threshold.

Since the cloud user is the later actor in the game, for the cloud service request,

based on a priori information needed for cloud services, authorization or refusal to

make choices. If the cloud is the first choice of the service user, assuming a priori

information is directly assess the value of the trust, the application of trust evaluation

methods to assess the value of the service provider trust ]1,0[T , and when trust of

its assessed valueT , cloud users to take selection strategy, otherwise refused;

where [0,1] is the setting for cloud services are chosen to trust threshold. If the

cloud service is already offered in good faith through service, then do not have to trust

Advanced Science and Technology Letters Vol.143 (AST 2017)

20 Copyright © 2017 SERSC

this assessment, direct selection, until after the implementation of non-faith service

cloud service providers, will never accept their services.

Cloud service is the pioneer in the game, it is a rational choice of strategy, seeking

to maximize returns. Compliance triggering policy, after a malicious service provid-

ing, the cooperation will always terminate that application posteriori information

feedback, correction cloud services assessed trust value 0T or increase trust

threshold 1 .

For cloud services can provide honest service design constraint mechanism is as

follows: If a malicious cloud service providers, cloud users will never get the choice

to apply; cloud service is honest while providing services, applications ]1,0( ,

representing because of this honest service offer, the next time its earnings increasing.

Dishonest service offered payoff:

fS _dS Income IncomeS _ (1)

Honest service offered payoff:

cS =1

_ IncomeS (2)

When c fS S the honest cloud service provider will get more benefit.

( _ 2 _ )

( _ _ )

d

d

S Income S Income

S Income S Income

(3)

4 Conclusion

In this paper, we focus on user data protection issues in cloud computing, propose a

Game based method to data protection, while dynamically generate trust relationship

to release its own data to achieve balance of privacy protection and services

provided,in which we define trust metrics as a dynamic and flexible process that

offers a new perspective for decision-making. Firstly,from the perspective of game

theory,we describe the interactive of a cloud services and cloud between users as

behavior game, trust and decision-making (service selection) is important information

for both games. Applying game constraints, incentives both to implement credible

behavior. Then to introduce the various components of the method and give examples

of partially implemented method. The analysis shows that the performance of our

method is obvious and it can apply to cloud computing environment based on trust

services acquisition and has guidance for cloud users to select specific service to

achieve less privacy loss and more benefits. That high fraud costs make the services

and users both sides to implementation faith conduct. This game method can effec-

tively protect users' data and containment malicious service side, from another point

of view, it is also beneficial to the security of the service side.

Advanced Science and Technology Letters Vol.143 (AST 2017)

Copyright © 2017 SERSC 21

Acknowledgments

The work in this paper has been supported by Liaoning Province Science and Tech-

nology Program (SY2016011).

References

1. Deyi Li, Things cornerstone - Cloud Computing [J],Technology tide,2011, 5:42-45

2. ACM SIGCOMM Computer Communication Review, Volume 39, Number 1,2009, pp.50-

55.

3. G. Owen, Game theory, Naval Postgraduate School: Monterey, California, 2001.

4. S. Roy et al., A Survey of Game Theory as Applied to Network Security, in Proceedings

of the 43rd Hawaii International Conference on System Sciences, pp. 1-10, 2010.

5. I. K. Geckil and P. L. Anderson. Applied Game Theory and Strategic Behavior, Chapman

& Hall/CRC Press, 2009.

6. Yarui Chen,Liqin Tian.Cloud computing model and analysis based on user behavior

under dynamic environment Game Theory [J],Journal of Electronic,2011,39(8):1818-1823.

7. Zhangsheng Bing, Cai Wandong, Li Yongjun. Social network access control method based

on game theory [J], Northwestern Polytechnical University,2011,29(4):652-657

8. Tianli Qin, Lin Chuang. Trusted Network in an act of trust-based predictive control mech-

anisms Game [J], Journal of Computers,2007,30(11):1930-1938

9. Kuang Sheng Hui, Li Bo cloud computing architecture and application examples analysis

[J], Computer and Digital Engineering, 2010 03

10. Zhang Qiang, Liu Qiang, linear assignment method to improve and Bernardo Study [J].

Industrial Engineering and Management,2009,(1):5-10

11. Xiaohui Li, Jingsha He, Ting Zhang. A service-oriented identity authentication privacy

protection method in cloud computing. International Journal of Grid and Distributed Com-

puting, 2013, 6(1): 77-86.

Advanced Science and Technology Letters Vol.143 (AST 2017)

22 Copyright © 2017 SERSC