Abstract
Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers in a virtual environment setting. Recent studies identify that malicious users may compromise the semantic integrity of NVE applications and violate the semantic rules of the virtual environments without being detected. In this paper, we propose an efficient audit protocol to detect violations of semantic integrity through a probabilistic checking mechanism done by a third-party audit server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Baughman, N.E., Levine, B.N.: Cheat-proof playout for centralized and distributed online games. In: IEEE INFOCOM, pp. 104–113 (2001)
Baughman, N.E., Liberatore, M., Levine, B.N.: Cheat-proof playout for centralized and peer-to-peer gaming. IEEE/ACM Trans. Netw. 15(1), 1–13 (2007)
Chen, B.D., Maheswaran, M.: A cheat controlled protocol for centralized online multiplayer games. In: Proceedings of the 3rd Workshop on Network and System Support for Games (NETGAMES), pp. 139–143. ACM Press, New York (2004)
Chen, B.D., Maheswaran, M.: A fair synchronization protocol with cheat proofing for decentralized online multiplayer games. In: 3rd IEEE International Symposium on Network Computing and Applications (NCA), pp. 372–375 (2004)
Davis, S.B.: Why cheating matters. In: Game Developer’s Conference (2003), http://www.secureplay.com/papers/docs/WhyCheatingMatters.pdf
Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable grid computing. In: International Conference on Distributed Computing Systems (ICDCS), pp. 4–11
Haber, S., Hatano, Y., Honda, Y., Horne, W., Miyazaki, K., Sander, T., Tezoku, S., Yao, D.: Efficient signature schemes supporting redaction, pseudonymization, and data deidentification. In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 353–362 (2008)
Harding-Rolls, P.: Western world MMOG market: 2006 review and forecasts to 2011, Management Report. Screen Digest (March 2007)
Jha, S., Katzenbeisser, S., Schallhart, C., Veith, H., Chenney, S.: Enforcing semantic integrity on untrusted clients in networked virtual environments. In: IEEE Symposium on Security and Privacy, pp. 179–186 (2007)
Joslin, C., Giacomo, T.D., Magnenat-Thalmann, N.: Collaborative virtual environments: From birth to standardization. IEEE Communications Magzine, 28–33 (April 2004)
Joslin, C., Pandzic, I.S., Magnenat-Thalmann, N.: Trends in networked collaborative virtual environments. Computer Communications 26(5), 430–437 (2003)
Knutsson, B., Lu, H., Xu, W., Hopkins, B.: Peer-to-peer support for massively multiplayer games. In: IEEE INFOCOM (2004)
Merkle, R.: Protocols for public key cryptosystems. In: Proceedings of the 1980 Symposium on Security and Privacy, pp. 122–133. IEEE Computer Society Press, Los Alamitos (1980)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Phan, T., Yao, D.: Select audit: A secure and efficient audit framework for networked virtual environments. Technical Report DCS-TR-642, Rutgers University (2008)
Pritchard, M.: How to hurt the hackers: The scoop on internet cheating and how you can combat it, http://www.gamasutra.com/features/20000724/pritchard_pfv.htm
Second Life, http://secondlife.com/
World of Warcraft, http://www.worldofwarcraft.com/index.xml
Yan, J.: Security design in online games. In: ACSAC 2003, Washington, DC, USA, p. 286. IEEE Computer Society, Los Alamitos (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Phan, T., Yao, D.(. (2009). SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-03354-4_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03353-7
Online ISBN: 978-3-642-03354-4
eBook Packages: Computer ScienceComputer Science (R0)