A Privacy Protection Model of Data Publication Based on Game Theory

被引:12
|
作者
Kuang, Li [1 ]
Zhu, Yujia [1 ]
Li, Shuqi [1 ]
Yan, Xuejin [1 ]
Yan, Han [1 ]
Deng, Shuiguang [2 ]
机构
[1] Cent South Univ, Sch Software, Changsha 410075, Hunan, Peoples R China
[2] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
HASHING-BASED APPROACH; SERVICE RECOMMENDATION; K-ANONYMITY;
D O I
10.1155/2018/3486529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of sensor acquisition technology, more and more data are collected, analyzed, and encapsulated into application services. However, most of applications are developed by untrusted third parties. Therefore, it has become an urgent problem to protect users' privacy in data publication. Since the attacker may identify the user based on the combination of user's quasi-identifiers and the fewer quasi-identifier fields result in a lower probability of privacy leaks, therefore, in this paper, we aim to investigate an optimal number of quasi-identifier fields under the constraint of trade-offs between service quality and privacy protection. We first propose modelling the service development process as a cooperative game between the data owner and consumers and employing the Stackelberg game model to determine the number of quasi-identifiers that are published to the data development organization. We then propose a way to identify when the new data should be learned, as well, a way to update the parameters involved in the model, so that the new strategy on quasi-identifier fields can be delivered. The experiment first analyses the validity of our proposed model and then compares it with the traditional privacy protection approach, and the experiment shows that the data loss of our model is less than that of the traditional k-anonymity especially when strong privacy protection is applied.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Distinct model on privacy protection of dynamic data publication
    Xun-yi Ren
    Pan Zhang
    Yu-qi Zhou
    Cluster Computing, 2019, 22 : 15127 - 15136
  • [2] Distinct model on privacy protection of dynamic data publication
    Ren, Xun-yi
    Zhang, Pan
    Zhou, Yu-qi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 15127 - 15136
  • [3] Network Location Privacy Protection Based on Game Theory
    Fan, Ya-feng
    Liu, Hong-yue
    Yang, Wei-dong
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 246 - 250
  • [4] A Privacy Data Release Method based on Game Theory
    Ren, Yi
    Xiao, Zhiting
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 552 - 555
  • [5] Privacy protection of quantum BP neural network based on game theory
    Lin, Yusheng
    Chang, Yan
    Huang, Siwei
    Zhang, Shibin
    PHYSICA SCRIPTA, 2023, 98 (10)
  • [6] Privacy protection algorithm for the internet of vehicles based on local differential privacy and game model
    Han W.
    Cheng M.
    Lei M.
    Xu H.
    Yang Y.
    Qian L.
    Computers, Materials and Continua, 2020, 64 (02): : 1025 - 1038
  • [7] Privacy Protection Algorithm for the Internet of Vehicles Based on Local Differential Privacy and Game Model
    Han, Wenxi
    Cheng, Mingzhi
    Lei, Min
    Xii, Hanwen
    Yang, Yu
    Qian, Lei
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 64 (02): : 1025 - 1038
  • [8] A Game-based Method for User Privacy Protection in Big Data
    Li, Xiaohui
    Chen, Chaoyang
    Liu, Feng
    Li, Bo
    Wang, Yajun
    3RD ANNUAL INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGY AND COMMUNICATION ENGINEERING, 2020, 719
  • [9] Privacy Protection-oriented Mobile Crowdsensing Analysis Based on Game Theory
    Ma, Rong
    Xiong, Jinbo
    Lin, Mingwei
    Yao, Zhiqiang
    Lin, Hui
    Ye, Ayong
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 990 - 995
  • [10] The Dynamic Data Privacy Protection Strategy Based on the CAP Theory
    Sun, Xinwei
    Wei, Zhang
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2015, 7 (01) : 44 - 56