SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments

Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers in a virtual environment setting. Recent studies identify that malicious users may compromise the semantic integrity of NVE applications and violate the semantic rules of the virtual environments without being detected. In this paper, we propose an efficient audit protocol to detect violations of semantic integrity through a probabilistic checking mechanism done by a third-party audit server.

[1]  Ralph C. Merkle,et al.  Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.

[2]  Chris Joslin,et al.  Trends in networked collaborative virtual environments , 2003, Comput. Commun..

[3]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[4]  Jeff Yan,et al.  Security design in online games , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[5]  Muthucumaru Maheswaran,et al.  A cheat controlled protocol for centralized online multiplayer games , 2004, NetGames '04.

[6]  Chris Joslin,et al.  Collaborative virtual environments: from birth to standardization , 2004, IEEE Communications Magazine.

[7]  Brian Neil Levine,et al.  Cheat-proof playout for centralized and peer-to-peer gaming , 2007, IEEE/ACM Trans. Netw..

[8]  Brian Neil Levine,et al.  Cheat-proof playout for centralized and distributed online games , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[9]  Yasuo Hatano,et al.  Efficient signature schemes supporting redaction, pseudonymization, and data deidentification , 2008, ASIACCS '08.

[10]  Wenliang Du,et al.  Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[11]  Siani Pearson,et al.  Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy , 2005, iTrust.

[12]  Honghui Lu,et al.  Peer-to-peer support for massively multiplayer games , 2004, IEEE INFOCOM 2004.

[13]  Muthucumaru Maheswaran,et al.  A fair synchronization protocol with cheat proofing for decentralized online multiplayer games , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[14]  Stefan Katzenbeisser,et al.  Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[15]  Mark Lentczner,et al.  Second Life , 2007, USENIX Annual Technical Conference.

[16]  Xiaoyun Wang,et al.  Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.

[17]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.