A systematic review on game-theoretic models and different types of security requirements in cloud environment: challenges and opportunities

KS Gill, A Sharma, S Saxena - Archives of Computational Methods in …, 2024 - Springer
The presented survey paper explores the application of game theoretic models for
addressing security challenges in cloud computing environments. It highlights the …

Game theory for cyber security and privacy

CT Do, NH Tran, C Hong, CA Kamhoua… - ACM Computing …, 2017 - dl.acm.org
In this survey, we review the existing game-theoretic approaches for cyber security and
privacy issues, categorizing their application into two classes, security and privacy. To show …

Scalable risk assessment method for cloud computing using game theory (CCRAM)

E Furuncu, I Sogukpinar - Computer Standards & Interfaces, 2015 - Elsevier
Cloud computing is one of the most popular information processing concepts of today's IT
world. The security of the cloud computing is complicated because each service model uses …

Raising awareness about cloud security in industry through a board game

T Zhao, T Gasiba, U Lechner, M Pinto-Albuquerque - Information, 2021 - mdpi.com
Today, many products and solutions are provided on the cloud; however, the amount and
financial losses due to cloud security incidents illustrate the critical need to do more to …

Designing utility functions for game-theoretic cloud security assessment: a case for using the common vulnerability scoring system

L Maghrabi, E Pfluegel, SF Noorji - … International Conference On …, 2016 - ieeexplore.ieee.org
In recent years, cloud computing has emerged as a key computing paradigm because of its
ubiquitous, convenient and scalable on-demand access to a shared pool of computing …

A comprehensive insight into game theory in relevance to cyber security

F Anwar, BUII Khan, RF Olanrewaju… - … Journal of Electrical …, 2020 - section.iaesonline.com
The progressively ubiquitous connectivity in the present information systems pose newer
challenges tosecurity. The conventional security mechanisms have come a long way in …

Cats: A serious game in industry towards stronger cloud security

T Zhao, U Lechner, M Pinto-Albuquerque, E Ata… - … on Ubiquitous Security, 2022 - Springer
Cloud computing has become a widely applied technology in the industry. Broad network
access as a characteristic of cloud computing brings business value. It poses threats to …

A review of game-theoretic approaches for secure virtual machine resource allocation in cloud

P Narwal, D Kumar, M Sharma - Proceedings of the Second International …, 2016 - dl.acm.org
Cloud Computing is a new evolutionary and dynamic platform that makes use of
virtualization technology. In Cloud computing environment, virtualization abstracts the …

GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot

KS Gill, S Saxena, A Sharma - Computers & Security, 2020 - Elsevier
Cloud Computing has been adopted by many leading organizations for storage, processing,
sharing and to provide other services. It faces several security challenges from its …

Dynamic games in cyber-physical security: An overview

SR Etesami, T Başar - Dynamic Games and Applications, 2019 - Springer
Due to complex dependencies between multiple layers and components of emerging cyber-
physical systems, security and vulnerability of such systems have become a major challenge …