A Systematic Review on Game-Theoretic Models and Different Types of Security Requirements in Cloud Environment: Challenges and Opportunities
Komal Singh Gill,Anju Sharma,Sharad Saxena,Gill, Komal Singh,Sharma, Anju,Saxena, Sharad
DOI: https://doi.org/10.1007/s11831-024-10095-6
IF: 9.7
2024-04-02
Archives of Computational Methods in Engineering
Abstract:The presented survey paper explores the application of game theoretic models for addressing security challenges in cloud computing environments. It highlights the significance of cloud computing as an integral part of modern technology due to its accessibility, scalability, and cost-effectiveness. However, the paper acknowledges that security issues pose a considerable concern in cloud computing, surpassing the effectiveness of traditional security measures. To overcome these challenges, the paper focuses on game theory as a valuable framework for modeling security scenarios by considering strategic interactions among multiple parties with conflicting interests. By analyzing existing research, the presented paper investigates the practical utilization of game theoretic models to enhance security in real-world cloud computing environments. The findings suggest that while game theory holds promise in offering effective security solutions, further research is imperative to address the practical limitations of these models in the context of cloud computing.
computer science, interdisciplinary applications,engineering, multidisciplinary,mathematics