Sensitive Information Protection Model Based on Bayesian Game

被引:0
作者
Liu, Yuzhen [1 ,2 ]
Liu, Zhe [3 ]
Wang, Xiaoliang [1 ,2 ]
Yang, Qing [4 ]
Zuo, Guocai [5 ]
Jiang, Frank [6 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Hunan Key Lab Serv Comp & Novel Software Technol, Xiangtan 411201, Peoples R China
[3] Hunan Univ Technol & Business, Coll Comp & Informat Engn, Changsha, Peoples R China
[4] Guangzhou Maritime Univ, Sch Comp Sci & Informat Engn, Guangzhou, Peoples R China
[5] Hunan Software Vocat & Tech Univ, Xiangtan, Peoples R China
[6] Univ New S Wales, Sch Engn & IT, Sydney, NSW, Australia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 01期
基金
湖南省自然科学基金;
关键词
Sensitive information; game theory; Bayesian equilibrium; sensitive level; information entropy; AUTHENTICATION; STRATEGY;
D O I
10.32604/cmc.2022.029002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A game measurement model considering the attacker's knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service. We quantified the sensitive level of information according to the user's personalized sensitive information protection needs. Based on the probability distribution of sensitive level and attacker's knowledge background type, the strategy combination of service provider and attacker was analyzed, and a game-based sensitive information protection model was constructed. Through the combination of strategies under Bayesian equilibrium, the information entropy was used to measure the leakage of sensitive information. Furthermore, in the paper the influence of the sensitive level of information and the attacker's knowledge background on the strategy of both sides of the game was considered comprehensively. Further on, the leakage of the user's sensitive information was measured. Finally, the feasibility of the model was described by experiments.
引用
收藏
页码:883 / 898
页数:16
相关论文
共 50 条
  • [21] Bayesian-Based Game Theoretic Model to Guarantee Cooperativeness in Hybrid RF/FSO Mesh Networks
    Awwad, Osama
    Al-Fuqaha, Ala
    Khan, Bilal
    Benhaddou, Driss
    Guizani, Mohsen
    Rayes, Ammar
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 6547 - +
  • [22] Use of Advanced Traveler Information Systems for Route Choice: Interpretation Based on a Bayesian Model
    Liao, Chun-Hsiung
    Chen, Chun-Wei
    JOURNAL OF INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 19 (03) : 316 - 325
  • [23] An Improvement Proposal of Genetic Algorithms Based on Information Entropy and Game Theory
    Li, Jiacheng
    Li, Lei
    2019 SIXTH INTERNATIONAL CONFERENCE ON SOCIAL NETWORKS ANALYSIS, MANAGEMENT AND SECURITY (SNAMS), 2019, : 36 - 43
  • [24] Assessing Bayesian model averaging uncertainty of groundwater modeling based on information entropy method
    Zeng, Xiankui
    Wu, Jichun
    Wang, Dong
    Zhu, Xiaobin
    Long, Yuqiao
    JOURNAL OF HYDROLOGY, 2016, 538 : 689 - 704
  • [25] A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks
    He, Jingsha
    Li, Yue
    Zhu, Nafei
    FUTURE INTERNET, 2023, 15 (03):
  • [26] Multimodal fusion sensitive information classification based on mixed attention and CLIP model
    Huang, Shuaina
    Zhang, Zhiyong
    Song, Bin
    Mao, Yueheng
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (06) : 12425 - 12437
  • [27] The asymmetric information game model research of information systems outsourcing development
    Wang, L. K.
    FRONTIERS IN ENTERPRISE INTEGRATION, 2008, : 441 - 445
  • [28] A game theory model on the financial crisis with an unique Bayesian nash equilibrium
    Pu, YJ
    Yang, XT
    Zhao, Q
    PROCEEDINGS OF 2003 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, VOLS I AND II, 2003, : 726 - 736
  • [29] A Stochastic Game Model with Imperfect Information in Cyber Security
    Shiva, Sajjan
    Roy, Sankardas
    Bedi, Harkeerat
    Dasgupta, Dipankar
    Wu, Qishi
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 308 - 318
  • [30] Game-theoretical analysis of strategic information transmission for gradient privacy protection
    Jiang, Hanyuan
    Song, Wanjun
    Bai, Long
    Li, Yuzhe
    Chai, Tianyou
    JOURNAL OF CONTROL AND DECISION, 2025,