A game theoretic model of a protocol for data possession verification

Oualha, Nouha; Michiardi, Pietro; Roudier, Yves
Research report RR-07-189

This report discusses how to model a protocol for the verification of data possession that is intended to secure a cooperative peer-to-peer storage application. The verification protocol is a primitive for cooperation assessment, and indirectly motivates nodes to behave cooperatively within the application. This capability of the protocol to enforce cooperation between a data holder and a data owner is proved theoretically by modeling the verification protocol as a Bayesian game, and demonstrating that the solution of the game is an equilibrium where both parties, owner and holder, are cooperative.

Sécurité numérique
Eurecom Ref:
© EURECOM. Personal use of this material is permitted. The definitive version of this paper was published in Research report RR-07-189 and is available at :

PERMALINK : https://www.eurecom.fr/publication/2168