{"title":"A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities","authors":"Komal Singh Gill, Anju Sharma, Sharad Saxena","doi":"10.1007/s11831-024-10095-6","DOIUrl":null,"url":null,"abstract":"<div><p>The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It highlights the significance of cloud computing as an integral part of modern technology due to its accessibility, scalability, and cost-effectiveness. However, the paper acknowledges that security issues pose a considerable concern in cloud computing, surpassing the effectiveness of traditional security measures. To overcome these challenges, the paper focuses on game theory as a valuable framework for modeling security scenarios by considering strategic interactions among multiple parties with conflicting interests. By analyzing existing research, the presented paper investigates the practical utilization of game theoretic models to enhance security in real-world cloud computing environments. The findings suggest that while game theory holds promise in offering effective security solutions, further research is imperative to address the practical limitations of these models in the context of cloud computing.</p></div>","PeriodicalId":55473,"journal":{"name":"Archives of Computational Methods in Engineering","volume":"31 7","pages":"3857 - 3890"},"PeriodicalIF":9.7000,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Archives of Computational Methods in Engineering","FirstCategoryId":"5","ListUrlMain":"https://link.springer.com/article/10.1007/s11831-024-10095-6","RegionNum":2,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It highlights the significance of cloud computing as an integral part of modern technology due to its accessibility, scalability, and cost-effectiveness. However, the paper acknowledges that security issues pose a considerable concern in cloud computing, surpassing the effectiveness of traditional security measures. To overcome these challenges, the paper focuses on game theory as a valuable framework for modeling security scenarios by considering strategic interactions among multiple parties with conflicting interests. By analyzing existing research, the presented paper investigates the practical utilization of game theoretic models to enhance security in real-world cloud computing environments. The findings suggest that while game theory holds promise in offering effective security solutions, further research is imperative to address the practical limitations of these models in the context of cloud computing.
期刊介绍:
Archives of Computational Methods in Engineering
Aim and Scope:
Archives of Computational Methods in Engineering serves as an active forum for disseminating research and advanced practices in computational engineering, particularly focusing on mechanics and related fields. The journal emphasizes extended state-of-the-art reviews in selected areas, a unique feature of its publication.
Review Format:
Reviews published in the journal offer:
A survey of current literature
Critical exposition of topics in their full complexity
By organizing the information in this manner, readers can quickly grasp the focus, coverage, and unique features of the Archives of Computational Methods in Engineering.