A game theoretic model of a protocol for data possession verification