4 CONCLUSION
Therefore, in this research paper, we analysed the
authentication at the cloud by including the price and
safety issues. The subject matter is being studied
specifically within the context of an a two-stage
Stackelberg tournament. At the highest level, CSSVs
offer consumers privacy plans that include cloud
insurance and cloud security services. CSSVs are in
charge of making strategic decisions, such as cost and
safety investments. On the higher the platform, the
battle had been modelled as a CSSV-level
noncooperative subgame. The suggested Stackelberg
its stability was successfully demonstrated to be
present and to be singular. We gave detailed statistical
results for the suggested game. For an element of our
long-term efforts, we will include indemnification in
the internet cybersecurity industry.
REFERENCES
G. Xu, H. Li, S. Liu, M. Wen and R. Lu, “Efficient and
privacypreserving truth discovery in mobile crowd
sensing systems,” IEEE Transactions on Vehicular
Technology, vol. 68, no. 4, pp. 3854– 3865, 2019.
CALYPTIX, “Top 5 risks of cloud computing,”
https://www.caly ptix.com/research-2/top-5-risks-of-
cloud-computing/.
I. security, “Cloud security,” https://www.ibm.com/
security/s aas.
O. C. Security, “Cloud security: A reason to move to
cloud,” https: //www.oracle.com/security/index.html.
A. Piva, F. Bartolini and M. Barni, “Ieee internet
computing: Issue addendum - managing copyright:
Watermark and cryptography algorithms,” IEEE
Distributed Systems Online, vol. 3, no. 5, 2002.
R. Anderson and T. Moore, “Information security
economics–and beyond,” in Annual International
Cryptology Conference. Springer, August 2007, USA,
pp. 68–91.
M. Lelarge and J. Bolot, “Economic incentives to increase
security in the internet: The case for insurance,” in
INFOCOM. IEEE, April 2009, Brazil, pp. 1494–1502.
McAfee, “Net losses: Estimating the global cost of
cybercrime,” Tech. Rep., Center for Strategic and
International Studies, Economic Impact of Cybercrime
II, Jun, 2014.
I. T. R. Center and CyberScout, “Identity theft resource
center data breach reports,”
http://www.idtheftcenter.org/2016databre aches.html.
R. Pal, L. Golubchik, K. Psounis and P. Hui, “On a way to
improve cyber-insurer profits when a security vendor
becomes the cyberinsurer,” in IFIP Networking
Conference. IEEE, May 2013, USA, pp. 1–9.
P. Naghizadeh and M. Liu, “Opting out of incentive
mechanisms: A study of security as a non-excludable
public good,” IEEE Transactions on Information
Forensics and Security, vol. 11, no. 12, pp. 2790–2803,
2016.
X. Lu, D. Niyato, H. Jiang, P. Wang and H. V. Poor, “Cyber
insurance for heterogeneous wireless networks,” arXiv
preprint arXiv:1709.07198, 2017.
TechTarget, “cloud insurance,” http://searchcloudstorage.
techtar get.com/definition/cloud-insurance.
R. Pal, L. Golubchik, K. Psounis and P. Hui, “Security
pricing as enabler of cyber-insurance a first look at
differentiated pricing markets,” IEEE Transactions on
Dependable and Secure Computing, March 2017.
AIG, “Cyberedge,” https://www.aig.com/business/
insurance/c yber-insurance.
J. Chase, D. Niyato, P. Wang, S. Chaisiri and R. Ko, “A
scalable approach to joint cyber insurance and security-
as-a-service provisioning in cloud
AI4IoT 2023 - First International Conference on Artificial Intelligence for Internet of things (AI4IOT): Accelerating Innovation in Industry
and Consumer Electronics
270