Game-Theoretic Strategy for Personalized Privacy Protection

被引:0
作者
Yu, Chao [1 ]
Shi, Yuliang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan, Shandong, Peoples R China
来源
INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING | 2014年 / 7卷 / 04期
基金
中国国家自然科学基金;
关键词
multi-tenant; Software as a Service (SaaS); Nash equilibrium; privacy protection;
D O I
10.14257/ijgdc.2014.7.4.12
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the development of cloud computing, more and more service providers deploy multitenant applications to the cloud. Multi-tenant data is stored by non-fully trusted SaaS service providers, and the protection of data privacy attracts more attention. This paper proposes a privacy protection strategy customization framework. This framework considers the privacy protection needs, SaaS application performance, the interests of both tenants and SaaS service providers, and analyzes the whole privacy protection strategy formulation process based on the Nash equilibrium, then establishes the game model of privacy protection, finally obtains the privacy protection strategy by analyzing of the game model. The experiments show that the privacy protection game model has better feasibility and effectiveness.
引用
收藏
页码:123 / 138
页数:16
相关论文
共 18 条
[1]  
Aggarwal G., 2005, 2 CAN KEEP SECRET DI
[2]  
Allison David S., 2011, Information and Communication on Technology for the Fight against Global Warming. Proceedings First International Conference (ICT-GLOW 2011), P64, DOI 10.1007/978-3-642-23447-7_7
[3]  
Arganda D., 2011, P 20 INT C WORLD WID, P177, DOI DOI 10.1145/1963405.1963433
[4]  
Chang H, 2010, COMM COM INF SC, V120, P214
[5]   Generalized Nash equilibrium problems [J].
Facchinei, Francisco ;
Kanzow, Christian .
4OR-A QUARTERLY JOURNAL OF OPERATIONS RESEARCH, 2007, 5 (03) :173-210
[6]   OPTIMAL DECENTRALIZED FLOW-CONTROL OF MARKOVIAN QUEUING-NETWORKS WITH MULTIPLE CONTROLLERS [J].
HSIAO, MTT ;
LAZAR, AA .
PERFORMANCE EVALUATION, 1991, 13 (03) :181-204
[7]  
Mowbray M., 2009, P 4 INT ICST C COMMU, P5
[8]  
Pearson S., CLOUD COMPUTING SPRI, V200, P90
[9]  
Pearson S, 2009, CLOUD: 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING CHALLENGES OF CLOUD COMPUTING, P44, DOI 10.1109/CLOUD.2009.5071532
[10]  
Pieters W, 2011, COMPUTERS, PRIVACY AND DATA PROTECTION: AN ELEMENT OF CHOICE, P445, DOI 10.1007/978-94-007-0641-5_21