2017
DOI: 10.1007/s12652-017-0448-x
|View full text |Cite
|
Sign up to set email alerts
|

Refined game-theoretic approach to improve authenticity of outsourced databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…In order to reach the security goals, the proposed solution is designed to reduce the information losses and secure sensitive communication systems as well. In [27], Eltayesh et al formulated a Bayesian game to study the inaccurate, inconsistent, missing data in a database caused by the most common and dangerous cyber threats. In the same vein, the authors in [28] take into account the computational costs and misbehavior activities of malicious nodes and construct a dynamic Bayesian game to maximize the individual utility of each node in underwater acoustic sensor networks (UASNs).…”
Section: Related Workmentioning
confidence: 99%
“…In order to reach the security goals, the proposed solution is designed to reduce the information losses and secure sensitive communication systems as well. In [27], Eltayesh et al formulated a Bayesian game to study the inaccurate, inconsistent, missing data in a database caused by the most common and dangerous cyber threats. In the same vein, the authors in [28] take into account the computational costs and misbehavior activities of malicious nodes and construct a dynamic Bayesian game to maximize the individual utility of each node in underwater acoustic sensor networks (UASNs).…”
Section: Related Workmentioning
confidence: 99%
“…For example, Cisco approximates that the amount of IoT endpoints will hit 30 billion devices by 2030 [21]. Cloud computing [14,51,25,20] has long been the first choice of IoT manufacturers and providers for accommodating their storage and analytical needs [31] due to the unlimited and high-performance computing and storage capabilities that this technology provides. Nonetheless, the fact that cloud data-centers are usually deployed in locations that are quite far from the IoT devices entails high response time for high-end systems due to the long-distance and multi-hops communications.…”
Section: Introduction 11 Motivation and Problem Statementmentioning
confidence: 99%