Publication:
M-stability: threshold security meets transferable utility

dc.contributor.departmentDepartment of Computer Engineering
dc.contributor.departmentGraduate School of Sciences and Engineering
dc.contributor.kuauthorBiçer, Osman
dc.contributor.kuauthorKüpçü, Alptekin
dc.contributor.kuauthorYıldız, Burcu
dc.contributor.schoolcollegeinstituteCollege of Engineering
dc.contributor.schoolcollegeinstituteGRADUATE SCHOOL OF SCIENCES AND ENGINEERING
dc.date.accessioned2024-11-09T12:16:49Z
dc.date.issued2021
dc.description.abstractUse of game theory and mechanism design in cloud security is a well-studied topic. When applicable, it has the advantages of being efficient and simple compared to cryptography alone. Most analyses consider two-party settings, or multi-party settings where coalitions are not allowed. However, many cloud security problems that we face are in the multi-party setting and the involved parties can almost freely collaborate with each other. To formalize the study of disincentivizing coalitions from deviating strategies, a well-known definition named k-resiliency has been proposed by Abraham et al. (ACM PODC '06). Since its proposal, k-resiliency and related definitions are used extensively for mechanism design. However, in this work we observe the shortcoming of k-resiliency. That is, although this definition is secure, it is too strict to use for many cases and rule out secure mechanisms as insecure. To overcome this issue, we propose a new definition named ?.,""-repellence against the presence of a single coalition to replace k-resiliency. Our definition incorporates transferable utility in game theory as it is realistic in many distributed and multi-party computing settings. We also propose m-stability definition against the presence of multiple coalitions, which is inspired by threshold security in cryptography. We then show the advantages of our novel definitions on three mechanisms, none of which were previously analyzed against coalitions: incentivized cloud computation, forwarding data packages in ad hoc networks, and connectivity in ad hoc networks. Regarding the former, our concepts improve the proposal by Küpçü (IEEE TDSC '17), by ensuring a coalition-proof mechanism.
dc.description.fulltextYES
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuTÜBİTAK
dc.description.sponsorshipScientific and Technological Research Council of Turkey (TÜBİTAK)
dc.description.versionAuthor's final manuscript
dc.identifier.doi10.1145/3474123.3486758
dc.identifier.embargoNO
dc.identifier.filenameinventorynoIR03414
dc.identifier.quartileN/A
dc.identifier.scopus2-s2.0-85121424116
dc.identifier.urihttps://doi.org/10.1145/3474123.3486758
dc.keywordsAd hoc networks
dc.keywordsCooperative game theory
dc.keywordsOutsourced computing
dc.keywordsThreshold security
dc.language.isoeng
dc.publisherAssociation for Computing Machinery (ACM)
dc.relation.grantno1.19E+90
dc.relation.ispartofCCSW 2021 - Proceedings of the 2021 Cloud Computing Security Workshop, co-located with CCS 2021
dc.relation.urihttp://cdm21054.contentdm.oclc.org/cdm/ref/collection/IR/id/10200
dc.subjectBitcoin
dc.subjectEthereum
dc.subjectInternet of things
dc.titleM-stability: threshold security meets transferable utility
dc.typeConference Proceeding
dspace.entity.typePublication
local.contributor.kuauthorBiçer, Osman
local.contributor.kuauthorKüpçü, Alptekin
local.contributor.kuauthorYıldız, Burcu
local.publication.orgunit1College of Engineering
local.publication.orgunit1GRADUATE SCHOOL OF SCIENCES AND ENGINEERING
local.publication.orgunit2Department of Computer Engineering
local.publication.orgunit2Graduate School of Sciences and Engineering
relation.isOrgUnitOfPublication89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isOrgUnitOfPublication3fc31c89-e803-4eb1-af6b-6258bc42c3d8
relation.isOrgUnitOfPublication.latestForDiscovery89352e43-bf09-4ef4-82f6-6f9d0174ebae
relation.isParentOrgUnitOfPublication8e756b23-2d4a-4ce8-b1b3-62c794a8c164
relation.isParentOrgUnitOfPublication434c9663-2b11-4e66-9399-c863e2ebae43
relation.isParentOrgUnitOfPublication.latestForDiscovery8e756b23-2d4a-4ce8-b1b3-62c794a8c164

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
10200.pdf
Size:
338.24 KB
Format:
Adobe Portable Document Format