Skip to main content

SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments

  • Conference paper
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)

Abstract

Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers in a virtual environment setting. Recent studies identify that malicious users may compromise the semantic integrity of NVE applications and violate the semantic rules of the virtual environments without being detected. In this paper, we propose an efficient audit protocol to detect violations of semantic integrity through a probabilistic checking mechanism done by a third-party audit server.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baughman, N.E., Levine, B.N.: Cheat-proof playout for centralized and distributed online games. In: IEEE INFOCOM, pp. 104–113 (2001)

    Google Scholar 

  2. Baughman, N.E., Liberatore, M., Levine, B.N.: Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Trans. Netw. 15(1), 1–13 (2007)

    Article  Google Scholar 

  3. Chen, B.D., Maheswaran, M.: A cheat controlled protocol for centralized online multiplayer games. In: Proceedings of the 3rd Workshop on Network and System Support for Games (NETGAMES), pp. 139–143. ACM Press, New York (2004)

    Google Scholar 

  4. Chen, B.D., Maheswaran, M.: A fair synchronization protocol with cheat proofing for decentralized online multiplayer games. In: 3rd IEEE International Symposium on Network Computing and Applications (NCA), pp. 372–375 (2004)

    Google Scholar 

  5. Davis, S.B.: Why cheating matters. In: Game Developer’s Conference (2003), http://www.secureplay.com/papers/docs/WhyCheatingMatters.pdf

  6. Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable grid computing. In: International Conference on Distributed Computing Systems (ICDCS), pp. 4–11

    Google Scholar 

  7. Haber, S., Hatano, Y., Honda, Y., Horne, W., Miyazaki, K., Sander, T., Tezoku, S., Yao, D.: Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 353–362 (2008)

    Google Scholar 

  8. Harding-Rolls, P.: Western world MMOG market: 2006 review and forecasts to 2011, Management Report. Screen Digest (March 2007)

    Google Scholar 

  9. Jha, S., Katzenbeisser, S., Schallhart, C., Veith, H., Chenney, S.: Enforcing semantic integrity on untrusted clients in networked virtual environments. In: IEEE Symposium on Security and Privacy, pp. 179–186 (2007)

    Google Scholar 

  10. Joslin, C., Giacomo, T.D., Magnenat-Thalmann, N.: Collaborative virtual environments: From birth to standardization. IEEE Communications Magzine, 28–33 (April 2004)

    Google Scholar 

  11. Joslin, C., Pandzic, I.S., Magnenat-Thalmann, N.: Trends in networked collaborative virtual environments. Computer Communications 26(5), 430–437 (2003)

    Article  Google Scholar 

  12. Knutsson, B., Lu, H., Xu, W., Hopkins, B.: Peer-to-peer support for massively multiplayer games. In: IEEE INFOCOM (2004)

    Google Scholar 

  13. Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the 1980 Symposium on Security and Privacy, pp. 122–133. IEEE Computer Society Press, Los Alamitos (1980)

    Google Scholar 

  14. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  15. Phan, T., Yao, D.: Select audit: A secure and efficient audit framework for networked virtual environments. Technical Report DCS-TR-642, Rutgers University (2008)

    Google Scholar 

  16. Pritchard, M.: How to hurt the hackers: The scoop on internet cheating and how you can combat it, http://www.gamasutra.com/features/20000724/pritchard_pfv.htm

  17. Second Life, http://secondlife.com/

  18. World of Warcraft, http://www.worldofwarcraft.com/index.xml

  19. Yan, J.: Security design in online games. In: ACSAC 2003, Washington, DC, USA, p. 286. IEEE Computer Society, Los Alamitos (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Phan, T., Yao, D.(. (2009). SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03354-4_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03353-7

  • Online ISBN: 978-3-642-03354-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics