Modeling the Security of Virtual Machines in the Cloud using Repetitive Game Theory
Author(s):
Article Type:
Research/Original Article (دارای رتبه معتبر)
Abstract:
Today, the many benefits of cloud computing have led many businesses, large and small, to use cloud services to reduce their costs. In the meantime, there are some barriers to using cloud services, one of the biggest of which is security attacks affected by the supervisor. When a direct attack on a user is carried out on a supervisor, it may also indirectly attack other users' virtual machines. Meanwhile, the conflicting goals and interests of cloud service users and attackers make it difficult for cloud service providers to decide to invest in cloud server security modules. Therefore, in this article, using game theory, a suitable solution for deciding to invest in one of the security modules for each of the actors is presented. Also, using the iterative game model, all Nash equilibria have been extracted and analyzed. The results show that game theory can be well used in making the right decision and finding the right balance to make decisions about investing in the field of applied security. Based on the simulation results, it can be said that in repetitive games with a probability of repeating the game between 0.2 and 0.8, predetermined investment strategies or non-investment can lead to an appropriate Nash equilibrium and Pursue maximum benefits for cloud service users.
Keywords:
Language:
Persian
Published:
Soft Computing Journal, Volume:10 Issue: 1, 2023
Pages:
2 to 15
https://www.magiran.com/p2556093
سامانه نویسندگان
اطلاعات نویسنده(گان) توسط ایشان ثبت و تکمیل شدهاست. برای مشاهده مشخصات و فهرست همه مطالب، صفحه رزومه را ببینید.
مقالات دیگری از این نویسنده (گان)
-
A simulation model for the propagation of Covid-19 virus based on the discrete-time Markov chain
, Hossein Sabaghian-Bidgoli *
Soft Computing Journal, -
UAV path planning based on butterfly optimization algorithm in three-dimensional space
Hakimeh Mazaheri *, Salman Goli
Aerospace Science and Technology Journal, -
A Hybrid Algorithm using Firefly, Genetic, and Local Search Algorithms
Javad Salimisartaghti*
Soft Computing Journal,