Sensitive Information Protection Model Based on Bayesian Game

被引:0
作者
Liu, Yuzhen [1 ,2 ]
Liu, Zhe [3 ]
Wang, Xiaoliang [1 ,2 ]
Yang, Qing [4 ]
Zuo, Guocai [5 ]
Jiang, Frank [6 ]
机构
[1] Hunan Univ Sci & Technol, Sch Comp Sci & Engn, Xiangtan 411201, Peoples R China
[2] Hunan Key Lab Serv Comp & Novel Software Technol, Xiangtan 411201, Peoples R China
[3] Hunan Univ Technol & Business, Coll Comp & Informat Engn, Changsha, Peoples R China
[4] Guangzhou Maritime Univ, Sch Comp Sci & Informat Engn, Guangzhou, Peoples R China
[5] Hunan Software Vocat & Tech Univ, Xiangtan, Peoples R China
[6] Univ New S Wales, Sch Engn & IT, Sydney, NSW, Australia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 73卷 / 01期
基金
湖南省自然科学基金;
关键词
Sensitive information; game theory; Bayesian equilibrium; sensitive level; information entropy; AUTHENTICATION; STRATEGY;
D O I
10.32604/cmc.2022.029002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A game measurement model considering the attacker's knowledge background is proposed based on the Bayesian game theory aiming at striking a balance between the protection of sensitive information and the quality of service. We quantified the sensitive level of information according to the user's personalized sensitive information protection needs. Based on the probability distribution of sensitive level and attacker's knowledge background type, the strategy combination of service provider and attacker was analyzed, and a game-based sensitive information protection model was constructed. Through the combination of strategies under Bayesian equilibrium, the information entropy was used to measure the leakage of sensitive information. Furthermore, in the paper the influence of the sensitive level of information and the attacker's knowledge background on the strategy of both sides of the game was considered comprehensively. Further on, the leakage of the user's sensitive information was measured. Finally, the feasibility of the model was described by experiments.
引用
收藏
页码:883 / 898
页数:16
相关论文
共 50 条
  • [41] Proof of Game (PoG): A Game Theory Based Consensus Model
    Kumar, Adarsh
    Jain, Saurabh
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 755 - 764
  • [42] A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising
    Huang, Chin-Tser
    Sakib, Muhammad N.
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Njilla, Laurent
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (06) : 1257 - 1268
  • [43] Cyber-Physical Security Evaluation in Manufacturing Systems with a Bayesian Game Model
    Zarreh, Alireza
    Lee, Yooneun
    Al Janahi, Rafid
    Wan, HungDa
    Saygin, Can
    30TH INTERNATIONAL CONFERENCE ON FLEXIBLE AUTOMATION AND INTELLIGENT MANUFACTURING (FAIM2021), 2020, 51 : 1158 - 1165
  • [44] Game Model Based Register Allocation
    Chen Yong
    He Yanxiang
    Wu Wei
    Li Qing'an
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IV, 2010, : 131 - 134
  • [45] Game Model Based Register Allocation
    Chen Yong
    He Yanxiang
    Wu Wei
    Li Qing'an
    APPLIED INFORMATICS AND COMMUNICATION, PT 4, 2011, 227 : 268 - 273
  • [46] A Game-Theoretic Model of Cholera with Optimal Personal Protection Strategies
    Kobe, Julia
    Pritchard, Neil
    Short, Ziaqueria
    Erovenko, Igor, V
    Rychtar, Jan
    Rowell, Jonathan T.
    BULLETIN OF MATHEMATICAL BIOLOGY, 2018, 80 (10) : 2580 - 2599
  • [47] A central tendency-based privacy preserving model for sensitive XML association rules using Bayesian networks
    Iqbal, Khalid
    Yin, Xu-Cheng
    Hao, Hong-Wei
    Ilyas, Qazi Mudassar
    Yin, Xuwang
    INTELLIGENT DATA ANALYSIS, 2014, 18 (02) : 281 - 303
  • [48] The Investment Decision Based on Incomplete Information Game Theory
    Yan Jiating
    Lu Qingchu
    CONTEMPORARY INNOVATION AND DEVELOPMENT IN MANAGEMENT SCIENCE, 2012, : 95 - 99
  • [49] The analysis of the government information sharing based on the game theory
    Wang Tianyong
    Gao Ge
    Wang Qianqian
    Wang Yulei
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2433 - +
  • [50] Dynamic Keys Based Sensitive Information System
    Wu, Xianping
    Le, Phu Dung
    Srinivasan, Balasubramaniam
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1895 - 1901