Sensitive Information Protection Model Based on Bayesian Game

被引:0
作者
Liu, Yuzhen [1 ,2 ]
Liu, Zhe [3 ]
Wang, Xiaoliang [1 ,2 ]
Yang, Qing [4 ]
Zuo, Guocai [5 ]
Jiang, Frank [6 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Hunan Key Lab Serv Comp & Novel Software Technol, Xiangtan 411201, Peoples R China
[3] Hunan Univ Technol & Business, Coll Comp & Informat Engn, Changsha, Peoples R China
[4] Guangzhou Maritime Univ, Sch Comp Sci & Informat Engn, Guangzhou, Peoples R China
[5] Hunan Software Vocat & Tech Univ, Xiangtan, Peoples R China
[6] Univ New S Wales, Sch Engn & IT, Sydney, NSW, Australia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 01期
基金
湖南省自然科学基金;
关键词
Sensitive information; game theory; Bayesian equilibrium; sensitive level; information entropy; AUTHENTICATION; STRATEGY;
D O I
10.32604/cmc.2022.029002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A game measurement model considering the attacker's knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service. We quantified the sensitive level of information according to the user's personalized sensitive information protection needs. Based on the probability distribution of sensitive level and attacker's knowledge background type, the strategy combination of service provider and attacker was analyzed, and a game-based sensitive information protection model was constructed. Through the combination of strategies under Bayesian equilibrium, the information entropy was used to measure the leakage of sensitive information. Furthermore, in the paper the influence of the sensitive level of information and the attacker's knowledge background on the strategy of both sides of the game was considered comprehensively. Further on, the leakage of the user's sensitive information was measured. Finally, the feasibility of the model was described by experiments.
引用
收藏
页码:883 / 898
页数:16
相关论文
共 50 条
  • [31] A game theory model of cybersecurity investments with information asymmetry
    Nagurney, Anna
    Nagurney, Ladimer S.
    NETNOMICS, 2015, 16 (1-2): : 127 - 148
  • [32] A Game Theoretical Model of Information Dissemination in Social Network
    Qiu, Wen
    Wang, Yuanzhuo
    Yu, Jianye
    PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 213 - 218
  • [33] Certificateless integrity auditing scheme for sensitive information protection in cloud storage
    Wen, Jian
    Deng, Lunzhi
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 156
  • [34] Collaborative Ordering of Enterprises with Differentiated Products under the Protection of Sensitive Information
    Wang Ping
    Zhong Weijun
    Lu Fang
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 658 - +
  • [35] Game-theoretical analysis of strategic information transmission for gradient privacy protection
    Jiang, Hanyuan
    Song, Wanjun
    Bai, Long
    Li, Yuzhe
    Chai, Tianyou
    JOURNAL OF CONTROL AND DECISION, 2025,
  • [36] Identification of Sensitive Content in Data Repositories to Support Personal Information Protection
    Briand, Antoine
    Zacharie, Sara
    Jean-Louis, Ludovic
    Meurs, Marie-Jean
    RECENT TRENDS AND FUTURE TECHNOLOGY IN APPLIED INTELLIGENCE, IEA/AIE 2018, 2018, 10868 : 898 - 910
  • [37] Modeling and optimization of networked evolutionary game based on incomplete information with switched topologies
    Gui, Yalin
    Gao, Lixin
    Li, Zhitao
    IET CONTROL THEORY AND APPLICATIONS, 2024, 18 (08) : 1045 - 1058
  • [38] A sensitive information protection scheme in Named Data Networking using attribute-based ring-signcryption
    Feng, Tao
    Liu, Ning ning
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 187 - 194
  • [39] Research on Topic Recognition of Network Sensitive information Based on SW-LDA Model
    Xu, Guixian
    Wu, Xu
    Yao, Haishen
    Li, Fan
    Yu, Ziheng
    IEEE ACCESS, 2019, 7 : 21527 - 21538
  • [40] Research on the Benefit Allocation Model in Ecological Supply Chain Information Share Based on Game Theory
    Xiu Guo-yi
    Chen Xiao-hua
    2012 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, 2012, : 583 - 588