2018
DOI: 10.1155/2018/3486529
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy Protection Model of Data Publication Based on Game Theory

Abstract: With the rapid development of sensor acquisition technology, more and more data are collected, analyzed, and encapsulated into application services. However, most of applications are developed by untrusted third parties. Therefore, it has become an urgent problem to protect users’ privacy in data publication. Since the attacker may identify the user based on the combination of user’s quasi-identifiers and the fewer quasi-identifier fields result in a lower probability of privacy leaks, therefore, in this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 22 publications
(23 reference statements)
0
14
0
Order By: Relevance
“…We will continue to further the analysis of influencing factors and consider the impacts of different ways of collaborating to optimize our forecasting methods. The thing we want to know is the relationship between the ecosystem health of open source software and the privacy protection of contributors [22]. However, From Figure 11, project elasticsearch shows the best health result in eight projects in June 2015, and the next is react, followed by django, bootstrap.…”
Section: Discussionmentioning
confidence: 99%
“…We will continue to further the analysis of influencing factors and consider the impacts of different ways of collaborating to optimize our forecasting methods. The thing we want to know is the relationship between the ecosystem health of open source software and the privacy protection of contributors [22]. However, From Figure 11, project elasticsearch shows the best health result in eight projects in June 2015, and the next is react, followed by django, bootstrap.…”
Section: Discussionmentioning
confidence: 99%
“…As a typical mathematical method, game theory has been widely used in network security Tong and Zhong (2016), privacy protection Ying and Nayak (2017); Kuang et al (2018); Xiong et al (2018); Zhou et al (2019) and wireless networks Do et al (2017) in recent years. Do et al (2017) discussed the existing game theory-based security protection features, including physical security, communication architecture, privacy protection, and defense mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…Hu Z and Wu W [28,29] studied the offense-defense mechanism of Topcoder.com contests, constructed a game theoretical model, and calculated the Nash equilibrium to deduce these developers' specific behavior decisions. Kuang L, Zhu Y, Li S, et al [30] used game theory in data privacy protection. Other studies paid attention to the correlation between developers and the reward of tasks.…”
Section: Research On Crowd Workersmentioning
confidence: 99%