Title : 
A Game Theoretic Model of a Protocol for Data Possession Verification
         
        
            Author : 
Oualha, Nouha ; Michiardi, Pietro ; Roudier, Yves
         
        
            Author_Institution : 
Institut Eurécom, Sophia Antipolis, France, oualha@eurecom.fr
         
        
        
        
        
        
            Abstract : 
This paper discusses how to model a protocol for the verification of data possession intended to secure a peer-to-peer storage application. The verification protocol is a primitive for storage assessment, and indirectly motivates nodes to behave cooperatively within the application. The capability of the protocol to enforce cooperation between a data holder and a data owner is proved theoretically by modeling the verification protocol as a Bayesian game, and demonstrating that the solution of the game is an equilibrium where both parties are cooperative.
         
        
            Keywords : 
Bayesian methods; Cryptography; Data security; Game theory; Memory; Peer to peer computing; Protection; Protocols; Remuneration; Secure storage;
         
        
        
        
            Conference_Titel : 
World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a
         
        
            Conference_Location : 
Espoo, Finland
         
        
            Print_ISBN : 
978-1-4244-0993-8
         
        
            Electronic_ISBN : 
978-1-4244-0993-8
         
        
        
            DOI : 
10.1109/WOWMOM.2007.4351805