Sensitive Information Protection Model Based on Bayesian Game

被引:0
|
作者
Liu, Yuzhen [1 ,2 ]
Liu, Zhe [3 ]
Wang, Xiaoliang [1 ,2 ]
Yang, Qing [4 ]
Zuo, Guocai [5 ]
Jiang, Frank [6 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Hunan Key Lab Serv Comp & Novel Software Technol, Xiangtan 411201, Peoples R China
[3] Hunan Univ Technol & Business, Coll Comp & Informat Engn, Changsha, Peoples R China
[4] Guangzhou Maritime Univ, Sch Comp Sci & Informat Engn, Guangzhou, Peoples R China
[5] Hunan Software Vocat & Tech Univ, Xiangtan, Peoples R China
[6] Univ New S Wales, Sch Engn & IT, Sydney, NSW, Australia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 01期
基金
湖南省自然科学基金;
关键词
Sensitive information; game theory; Bayesian equilibrium; sensitive level; information entropy; AUTHENTICATION; STRATEGY;
D O I
10.32604/cmc.2022.029002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A game measurement model considering the attacker's knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service. We quantified the sensitive level of information according to the user's personalized sensitive information protection needs. Based on the probability distribution of sensitive level and attacker's knowledge background type, the strategy combination of service provider and attacker was analyzed, and a game-based sensitive information protection model was constructed. Through the combination of strategies under Bayesian equilibrium, the information entropy was used to measure the leakage of sensitive information. Furthermore, in the paper the influence of the sensitive level of information and the attacker's knowledge background on the strategy of both sides of the game was considered comprehensively. Further on, the leakage of the user's sensitive information was measured. Finally, the feasibility of the model was described by experiments.
引用
收藏
页码:883 / 898
页数:16
相关论文
共 50 条
  • [1] Using Bayesian networks to model the belief in the opponent in static game with incomplete information
    Wang, XF
    Liu, WY
    Li, J
    Zhao, Y
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 249 - 252
  • [2] A Method of Information Fusion based on Game Theory and Bayesian Network
    Guo, Changgeng
    Zhang, Juncai
    Zhong, Luo
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 41 - 47
  • [3] Quantum Bayesian game with symmetric and asymmetric information
    Haozhen Situ
    Quantum Information Processing, 2015, 14 : 1827 - 1840
  • [4] Quantum Bayesian game with symmetric and asymmetric information
    Situ, Haozhen
    QUANTUM INFORMATION PROCESSING, 2015, 14 (06) : 1827 - 1840
  • [5] Bayesian game model based unsupervised sentiment analysis of product reviews
    Punetha, Neha
    Jain, Goonjan
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 214
  • [6] An Information Source Selection Model Based on Evolutionary Game Theory
    Deng, Xinyang
    Jiang, Wen
    Wang, Zhen
    APPLIED MATHEMATICS AND COMPUTATION, 2020, 385
  • [7] QoS sensitive VANET Control Scheme based on Feedback Game Model
    Kim, Sungwook
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (05): : 1752 - 1767
  • [8] An Information Dissemination Model Based on the Rumor and Antirumor and Cognitive Game
    Mou, Xuemei
    Xiao, Yunpeng
    He, Weikang
    Wang, Rong
    Duan, Sirui
    Li, Qian
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2025,
  • [9] Evaluation model of information security technologies based on game theoretic
    Zhu, Jian-Ming
    Raghunathan, Srinivasan
    Jisuanji Xuebao/Chinese Journal of Computers, 2009, 32 (04): : 828 - 834
  • [10] The Analysis of Information Management in Government Investment Projects Based on the Incomplete Information Static Game Model
    Quan Xuefeng
    Chang Mengxing
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY, 2015, 30 : 1860 - 1863