A Privacy Protection Model of Data Publication Based on Game Theory

被引:12
|
作者
Kuang, Li [1 ]
Zhu, Yujia [1 ]
Li, Shuqi [1 ]
Yan, Xuejin [1 ]
Yan, Han [1 ]
Deng, Shuiguang [2 ]
机构
[1] Cent South Univ, Sch Software, Changsha 410075, Hunan, Peoples R China
[2] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Zhejiang, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
HASHING-BASED APPROACH; SERVICE RECOMMENDATION; K-ANONYMITY;
D O I
10.1155/2018/3486529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of sensor acquisition technology, more and more data are collected, analyzed, and encapsulated into application services. However, most of applications are developed by untrusted third parties. Therefore, it has become an urgent problem to protect users' privacy in data publication. Since the attacker may identify the user based on the combination of user's quasi-identifiers and the fewer quasi-identifier fields result in a lower probability of privacy leaks, therefore, in this paper, we aim to investigate an optimal number of quasi-identifier fields under the constraint of trade-offs between service quality and privacy protection. We first propose modelling the service development process as a cooperative game between the data owner and consumers and employing the Stackelberg game model to determine the number of quasi-identifiers that are published to the data development organization. We then propose a way to identify when the new data should be learned, as well, a way to update the parameters involved in the model, so that the new strategy on quasi-identifier fields can be delivered. The experiment first analyses the validity of our proposed model and then compares it with the traditional privacy protection approach, and the experiment shows that the data loss of our model is less than that of the traditional k-anonymity especially when strong privacy protection is applied.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Data protection and privacy: a model for evidence management
    Freund, Gislaine Parra
    de Macedo, Douglas Dyllon Jeronimo
    Fagunde, Priscila Basto
    EM QUESTAO, 2023, 29
  • [32] Publication of lectures and students personal data and personal privacy. the protection of personal data in the university
    Troncoso Reigada, Antonio
    REVISTA DE DERECHO POLITICO, 2006, (67): : 79 - 163
  • [33] Trajectory data privacy protection based on differential privacy mechanism
    Gu, Ke
    Yang, Lihao
    Liu, Yongzhi
    Liao, Niandong
    2017 2ND INTERNATIONAL CONFERENCE ON RELIABILITY ENGINEERING (ICRE 2017), 2018, 351
  • [34] Privacy Cost Analysis and Privacy Protection Based on Big Data
    周蔷
    岳开旭
    段垚
    Journal of Donghua University(English Edition), 2019, 36 (01) : 96 - 105
  • [35] A dynamic evaluation model of data price based on game theory
    Zhao Bin
    Zhang Jiqun
    Cao Wei
    Li Bin
    Zhang Wenyin
    Gao Yilong
    Peer-to-Peer Networking and Applications, 2023, 16 : 2073 - 2088
  • [36] A dynamic evaluation model of data price based on game theory
    Bin, Zhao
    Jiqun, Zhang
    Wei, Cao
    Bin, Li
    Wenyin, Zhang
    Yilong, Gao
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2073 - 2088
  • [37] A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks
    He, Jingsha
    Li, Yue
    Zhu, Nafei
    FUTURE INTERNET, 2023, 15 (03):
  • [38] Access Control Model Extensions to Support Data Privacy Protection based on GDPR
    Davari, Maryam
    Bertino, Elisa
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 4017 - 4024
  • [39] Big data security and privacy protection model based on image encryption algorithm
    Hua, Binjie
    Wang, Zhe
    Meng, Junying
    Xi, HaiYan
    Qi, RuiLi
    SOFT COMPUTING, 2023,
  • [40] A Data Sharing Privacy Protection Model Based on Federated Learning and Blockchain Technology
    Ren, Fei
    Liang, Zhi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 1317 - 1326