Publication: m-Stability: threshold security meets transferable utility
dc.contributor.department | Department of Mathematics | |
dc.contributor.department | Department of Computer Engineering | |
dc.contributor.department | Graduate School of Sciences and Engineering | |
dc.contributor.kuauthor | Biçer, Osman | |
dc.contributor.kuauthor | Yıldız, Burcu | |
dc.contributor.kuauthor | Küpçü, Alptekin | |
dc.contributor.schoolcollegeinstitute | College of Engineering | |
dc.contributor.schoolcollegeinstitute | College of Sciences | |
dc.contributor.schoolcollegeinstitute | GRADUATE SCHOOL OF SCIENCES AND ENGINEERING | |
dc.date.accessioned | 2025-03-06T21:00:05Z | |
dc.date.issued | 2021 | |
dc.description.abstract | Use of game theory and mechanism design in cloud security is a well-studied topic. When applicable, it has the advantages of being efficient and simple compared to cryptography alone. Most analyses consider two-party settings, or multi-party settings where coalitions are not allowed. However, many cloud security problems that we face are in the multi-party setting and the involved parties can almost freely collaborate with each other. To formalize the study of disincentivizing coalitions from deviating strategies, a well-known definition named. k-resiliency has been proposed by Abraham et al. (ACM PODC '06). Since its proposal, k-resiliency and related definitions are used extensively for mechanism design. However, in this work we observe the shortcoming of k-resiliency. That is, although this definition is secure, it is too strict to use for many cases and rule out secure mechanisms as insecure. To overcome this issue, we propose a new definition named l-repellence against the presence of a single coalition to replace k-resiliency. Our definition incorporates transferable utility in game theory as it is realistic in many distributed and multi-party computing settings. We also propose. m-stability definition against the presence of multiple coalitions, which is inspired by threshold security in cryptography. We then show the advantages of our novel definitions on three mechanisms, none of which were previously analyzed against coalitions: incentivized cloud computation, forwarding data packages in ad hoc networks, and connectivity in ad hoc networks. Regarding the former, our concepts improve the proposal by Kupcu (IEEE TDSC '17), by ensuring a coalition-proof mechanism. | |
dc.description.indexedby | WOS | |
dc.description.indexedby | Scopus | |
dc.description.publisherscope | International | |
dc.description.sponsoredbyTubitakEu | TÜBİTAK | |
dc.description.sponsorship | We acknowledge support from TÜBİTAK, the Scientific and Technological Research Council of Turkey, under project number 119E088. | |
dc.identifier.doi | 10.1145/3474123.3486758 | |
dc.identifier.grantno | TÜBİTAK;Scientific and Technological Research Council of Turkey [119E088] | |
dc.identifier.isbn | 9781450386531 | |
dc.identifier.quartile | N/A | |
dc.identifier.scopus | 2-s2.0-85121424116 | |
dc.identifier.uri | https://doi.org/10.1145/3474123.3486758 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/27842 | |
dc.identifier.wos | 1146900400007 | |
dc.keywords | Threshold security | |
dc.keywords | Cooperative game theory | |
dc.keywords | Outsourced computing | |
dc.keywords | Ad hoc networks | |
dc.language.iso | eng | |
dc.publisher | Association for Computing Machinery | |
dc.relation.ispartof | Proceedings of the 2021 Cloud Computing Security Workshop, CCSW 2021 | |
dc.subject | Computer science, information systems | |
dc.subject | Computer science, theory and methods | |
dc.subject | Telecommunications | |
dc.subject | Nanoscience and nanotechnology | |
dc.title | m-Stability: threshold security meets transferable utility | |
dc.type | Conference Proceeding | |
dspace.entity.type | Publication | |
local.contributor.kuauthor | Biçer, Osman | |
local.contributor.kuauthor | Yıldız, Burcu | |
local.contributor.kuauthor | Küpçü, Alptekin | |
local.publication.orgunit1 | GRADUATE SCHOOL OF SCIENCES AND ENGINEERING | |
local.publication.orgunit1 | College of Sciences | |
local.publication.orgunit1 | College of Engineering | |
local.publication.orgunit2 | Department of Mathematics | |
local.publication.orgunit2 | Department of Computer Engineering | |
local.publication.orgunit2 | Graduate School of Sciences and Engineering | |
relation.isOrgUnitOfPublication | 2159b841-6c2d-4f54-b1d4-b6ba86edfdbe | |
relation.isOrgUnitOfPublication | 89352e43-bf09-4ef4-82f6-6f9d0174ebae | |
relation.isOrgUnitOfPublication | 3fc31c89-e803-4eb1-af6b-6258bc42c3d8 | |
relation.isOrgUnitOfPublication.latestForDiscovery | 2159b841-6c2d-4f54-b1d4-b6ba86edfdbe | |
relation.isParentOrgUnitOfPublication | 8e756b23-2d4a-4ce8-b1b3-62c794a8c164 | |
relation.isParentOrgUnitOfPublication | af0395b0-7219-4165-a909-7016fa30932d | |
relation.isParentOrgUnitOfPublication | 434c9663-2b11-4e66-9399-c863e2ebae43 | |
relation.isParentOrgUnitOfPublication.latestForDiscovery | 8e756b23-2d4a-4ce8-b1b3-62c794a8c164 |