Game-Theoretic Strategy for Personalized Privacy Protection

نویسندگان

  • Chao Yu
  • Yuliang Shi
چکیده

With the development of cloud computing, more and more service providers deploy multitenant applications to the cloud. Multi-tenant data is stored by non-fully trusted SaaS service providers, and the protection of data privacy attracts more attention. This paper proposes a privacy protection strategy customization framework. This framework considers the privacy protection needs, SaaS application performance, the interests of both tenants and SaaS service providers, and analyzes the whole privacy protection strategy formulation process based on the Nash equilibrium, then establishes the game model of privacy protection, finally obtains the privacy protection strategy by analyzing of the game model. The experiments show that the privacy protection game model has better feasibility and effectiveness.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Game Theoretic Framework for Data Privacy Preservation in Recommender Systems

We address the fundamental tradeoff between privacy preservation and high-quality recommendation stemming from a third party. Multiple users submit their ratings to a third party about items they have viewed. The third party aggregates the ratings and generates personalized recommendations for each user. The quality of recommendations for each user depends on submitted rating profiles from all ...

متن کامل

Privacy Consensus in Anonymization Systems via Game Theory

Privacy protection appears as a fundamental concern when personal data is collected, stored, and published. Several anonymization methods have been proposed to address privacy issues in private datasets. Every anonymization method has at least one parameter to adjust the level of privacy protection considering some utility for the collected data. Choosing a desirable level of privacy protection...

متن کامل

Performance Measurements for Privacy Preserving Data Mining

This paper establishes the foundation for the performance measurements of privacy preserving data mining techniques. The performance is measured in terms of the accuracy of data mining results and the privacy protection of sensitive data. On the accuracy side, we address the problem of previous measures and propose a new measure, named “effective sample size”, to solve this problem. We show tha...

متن کامل

A Game-Theoretic Perspective on Oblivious Transfer

Asharov, Canetti, and Hazay (Eurocrypt 2011) studied how game-theoretic concepts can be used to capture the cryptographic properties of correctness, privacy, and fairness in two-party protocols in the presence of fail-stop adversaries. Based on their work, we characterize the properties of “two-message” oblivious transfer protocols in terms of game-theoretic concepts. Specifically, we present a...

متن کامل

Game-Theoretic Approach for Pricing Decisions in Dual-Channel Supply Chain

In the current study, a dual-channel supply chain is considered containing one manufacturer and two retailers. It is assumed that the manufacturer and retailers have the same decision powers. A game-theoretic approach is developed to analyze pricing decisions under the centralized and decentralized scenarios. First, the Nash model is established to obtain the equilibrium decisions in the decent...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014