“…In order to verify the authenticity of the above three scenarios, this study uses MATLAB R2021a software to simulate and analyze each parameter. Although the setting of the initial value of the parameter affects its evolution range and speed to a certain extent, it will not change its overall trend and results [54,55]. The most important thing is the accuracy of the model establishment and the practicality of the model, which aims to reveal the regular characteristics of things changing [56].…”
Section: Experimental Data and Simulationmentioning
Due to the confidentiality, value and exclusivity of technical secrets, how to protect the technical secrets within cultural industry clusters has become a paradoxical issue and a research hotspot. Focusing on the collaborative protection of technical secrets within cultural industry clusters, this paper analyzes the strategies of collaborative protection of technical secrets between leading enterprises and following enterprises based on evolutionary game theory, and uses dynamic evolution and simulation methods to identify key factors behind the strategy choices, which further enriches the evolutionary mechanism of collaborative protection, and expands the application scenarios of the theory of evolutionary game. As the research results show, the collaborative protection strategy of technical secrets within cultural industry clusters is feasible, the cost of collaborative protection, government subsidies, and compensation for collaborative deposits are key variables that determine the trend of the game. The government subsidy coefficient, the collaborative deposits, and the difference in the number of technology secrets are strongly sensitive factors underlying the mode of protection, while the synergistic benefits between firms are weakly sensitive factors. Therefore, this paper proposes that increasing government subsidies and collaborative deposits, and reducing the differences in the number of technical secrets among game subjects can promote enterprises to eliminate suspicion and increase their willingness to cooperate in protecting technical secrets.
“…In order to verify the authenticity of the above three scenarios, this study uses MATLAB R2021a software to simulate and analyze each parameter. Although the setting of the initial value of the parameter affects its evolution range and speed to a certain extent, it will not change its overall trend and results [54,55]. The most important thing is the accuracy of the model establishment and the practicality of the model, which aims to reveal the regular characteristics of things changing [56].…”
Section: Experimental Data and Simulationmentioning
Due to the confidentiality, value and exclusivity of technical secrets, how to protect the technical secrets within cultural industry clusters has become a paradoxical issue and a research hotspot. Focusing on the collaborative protection of technical secrets within cultural industry clusters, this paper analyzes the strategies of collaborative protection of technical secrets between leading enterprises and following enterprises based on evolutionary game theory, and uses dynamic evolution and simulation methods to identify key factors behind the strategy choices, which further enriches the evolutionary mechanism of collaborative protection, and expands the application scenarios of the theory of evolutionary game. As the research results show, the collaborative protection strategy of technical secrets within cultural industry clusters is feasible, the cost of collaborative protection, government subsidies, and compensation for collaborative deposits are key variables that determine the trend of the game. The government subsidy coefficient, the collaborative deposits, and the difference in the number of technology secrets are strongly sensitive factors underlying the mode of protection, while the synergistic benefits between firms are weakly sensitive factors. Therefore, this paper proposes that increasing government subsidies and collaborative deposits, and reducing the differences in the number of technical secrets among game subjects can promote enterprises to eliminate suspicion and increase their willingness to cooperate in protecting technical secrets.
As a result of a shift in the world of technology, the combination of ubiquitous mobile networks and cloud computing produced the mobile cloud computing (MCC) domain. As a consequence of a major concern of cloud users, privacy and data protection are getting substantial attention in the field. Currently, a considerable number of papers have been published on MCC with a growing interest in privacy and data protection. Along with this advance in MCC, however, no specific investigation highlights the results of the existing studies in privacy and data protection. In addition, there are no particular exploration highlights trends and open issues in the domain. Accordingly, the objective of this paper is to highlight the results of existing primary studies published in privacy and data protection in MCC to identify current trends and open issues. In this investigation, a systematic mapping study was conducted with a set of six research questions. A total of 1711 studies published from 2009 to 2019 were obtained. Following a filtering process, a collection of 74 primary studies were selected. As a result, the present data privacy threats, attacks, and solutions were identified. Also, the ongoing trends of data privacy exercise were observed. Moreover, the most utilized measures, research type, and contribution type facets were emphasized. Additionally, the current open research issues in privacy and data protection in MCC were highlighted. Furthermore, the results demonstrate the current state-of-the-art of privacy and data protection in MCC, and the conclusion will help to identify research trends and open issues in MCC for researchers and offer useful information in MCC for practitioners.
“…Many prior research efforts have been conducted to address the privacy and security threats. In light of the growing privacy concerns in MCC, Li et al [78] proposed a certificate-aware framework for online access control systems, where users were compensated for their privacy certificate and operation disclosure and were motivated to present more certificate information. Au et al [16] provided an overview towards the mobile cloud privacy threats from different levels, such as information theft and data integrity breakage.…”
Section: Security and Privacy Preserving For Mobile Cloud Healthcarementioning
Mobile devices, along with wearable sensors, allow patients to access healthcare services from anywhere at any time. The longstanding constraints of computational capability and storage space on mobile devices can be alleviated by outsourcing computation-or data-intensive tasks to remote cloud centers. Thus, mobile cloud computing (MCC) has been recognized as a promising approach to provide pervasive healthcare services to people in their daily life. As the development and adoption of MCC techniques in healthcare, new optimization strategies have been explored and studied to help mobile cloud healthcare services to be deployed in a more effective and efficient manner. In this survey, we demonstrate how MCC techniques have been extensively deployed in various healthcare applications and, specifically, describe the general architecture and design considerations one should take into account while designing an MCC for healthcare scenarios. Given a large number of factors that may affect the performance of the MCC and even result in catastrophic consequences in healthcare, this paper presents the state-of-the-art optimization methods on the MCC for meeting the diverse priorities and achieving the optimal tradeoff among multiple objectives. Finally, the security and privacy issues of the MCC in healthcare are also discussed. INDEX TERMS Mobile cloud computing, pervasive healthcare. optimization, offloading, security and privacy. NOMENCLATURE
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.