Innovations and Interdisciplinary Solutions for Underserved Areas. Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14–15, 2019, Proceedings

Research Article

A Survey of Game Theoretic Solutions for Cloud Computing Security Issues

Download
142 downloads
  • @INPROCEEDINGS{10.1007/978-3-030-34863-2_1,
        author={Bernard Sane and Cheikh Babou and Doudou Fall and Ibrahima Niang},
        title={A Survey of Game Theoretic Solutions for Cloud Computing Security Issues},
        proceedings={Innovations and Interdisciplinary Solutions for Underserved Areas. Third EAI International Conference, InterSol 2019, Cairo, Egypt, February 14--15, 2019, Proceedings},
        proceedings_a={INTERSOL},
        year={2019},
        month={11},
        keywords={Cloud computing Game theory Security Countermeasures Virtualization},
        doi={10.1007/978-3-030-34863-2_1}
    }
    
  • Bernard Sane
    Cheikh Babou
    Doudou Fall
    Ibrahima Niang
    Year: 2019
    A Survey of Game Theoretic Solutions for Cloud Computing Security Issues
    INTERSOL
    Springer
    DOI: 10.1007/978-3-030-34863-2_1
Bernard Sane1,*, Cheikh Babou1,*, Doudou Fall2,*, Ibrahima Niang1,*
  • 1: University Cheikh Anta Diop of Dakar
  • 2: Nara Institute of Science and Technology
*Contact email: bernardousmane.sane@ucad.edu.sn, cheikhsalioumbacke.babou@ucad.edu.sn, doudou-f@is.naist.jp, ibrahima1.niang@ucad.edu.sn

Abstract

Cloud computing has become quintessential to information technology as it represents the foundation of all the emerging paradigms. Cloud computing uses virtualization to maximize resources utilization. Despite its benefits, organizations are still reluctant to adopt cloud computing due to its numerous security issues. Among the solutions that have been provided to solve cloud security issues, game theoretic proposals showed great potentials. In this paper, we survey the most representative game theoretic approaches to solve cloud computing security issues. We classify these approaches or methods based on their security scenarios and their respective solutions. We overview different solutions to control cloud vulnerabilities and threats using game theory. We also investigate and identify the limitations of these solutions and provide insights of the future of cloud security particularly on virtual machines, hypervisors and data security.