A Novel Privacy Technique for Augmented Reality Cloud Gaming Based on Image Authentication
Title | A Novel Privacy Technique for Augmented Reality Cloud Gaming Based on Image Authentication |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Gharsallaoui, R., Hamdi, M., Kim, T. |
Conference Name | 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) |
Keywords | augmented reality, augmented reality cloud gaming, authentication, cheating scenario problem, cloud computing, computer games, Computer hacking, cryptography, data privacy, Games, Human Behavior, image authentication, image processing, location-based games, message authentication, mobile computing, positioning data privacy, privacy, pubcrawl, resilience, Resiliency, Scalability, Watermarking |
Abstract | The evolution of cloud gaming systems is substantially the security requirements for computer games. Although online game development often utilizes artificial intelligence and human computer interaction, game developers and providers often do not pay much attention to security techniques. In cloud gaming, location-based games are augmented reality games which take the original principals of the game and applies them to the real world. In other terms, it uses the real world to impact the game experience. Because the execution of such games is distributed in cloud computing, users cannot be certain where their input and output data are managed. This introduces the possibility to input incorrect data in the exchange between the gamer's terminal and the gaming platform. In this context, we propose a new gaming concept for augmented reality and location-based games in order to solve the aforementioned cheating scenario problem. The merit of our approach is to establish an accurate and verifiable proof that the gamer reached the goal or found the target. The major novelty in our method is that it allows the gamer to submit an authenticated proof related to the game result without altering the privacy of positioning data. |
URL | https://ieeexplore.ieee.org/document/7986295 |
DOI | 10.1109/IWCMC.2017.7986295 |
Citation Key | gharsallaoui_novel_2017 |
- image authentication
- Watermarking
- Scalability
- Resiliency
- resilience
- pubcrawl
- privacy
- positioning data privacy
- mobile computing
- message authentication
- location-based games
- Image Processing
- augmented reality
- Human behavior
- Games
- data privacy
- Cryptography
- Computer hacking
- computer games
- Cloud Computing
- cheating scenario problem
- authentication
- augmented reality cloud gaming