DocumentCode :
1813430
Title :
A Game Theoretic Model of a Protocol for Data Possession Verification
Author :
Oualha, Nouha ; Michiardi, Pietro ; Roudier, Yves
Author_Institution :
Institut Eurécom, Sophia Antipolis, France, oualha@eurecom.fr
fYear :
2007
fDate :
18-21 June 2007
Firstpage :
1
Lastpage :
6
Abstract :
This paper discusses how to model a protocol for the verification of data possession intended to secure a peer-to-peer storage application. The verification protocol is a primitive for storage assessment, and indirectly motivates nodes to behave cooperatively within the application. The capability of the protocol to enforce cooperation between a data holder and a data owner is proved theoretically by modeling the verification protocol as a Bayesian game, and demonstrating that the solution of the game is an equilibrium where both parties are cooperative.
Keywords :
Bayesian methods; Cryptography; Data security; Game theory; Memory; Peer to peer computing; Protection; Protocols; Remuneration; Secure storage;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a
Conference_Location :
Espoo, Finland
Print_ISBN :
978-1-4244-0993-8
Electronic_ISBN :
978-1-4244-0993-8
Type :
conf
DOI :
10.1109/WOWMOM.2007.4351805
Filename :
4351805
Link To Document :
بازگشت