计算机科学 ›› 2018, Vol. 45 ›› Issue (6): 130-134.doi: 10.11896/j.issn.1002-137X.2018.06.022
张盼盼1,2,4, 彭长根2,3,4,5, 郝晨艳1,2,4
ZHANG Pan-pan1,2,4, PENG Chang-gen2,3,4,5, HAO Chen-yan1,2,4
摘要: 针对隐私保护与服务质量之间的均衡问题,提出了一种基于隐私偏好的博弈度量模型。首先,对用户的隐私偏好进行形式化定义,根据用户的隐私偏好度提出隐私偏好的量化方法;在此基础上,分析服务提供者基于用户隐私偏好的策略选择并提出基于博弈的隐私度量模型,在混合策略下运用策略熵度量用户隐私的泄露情况,能够全面地考虑用户的隐私偏好对服务提供者博弈策略的影响,并对用户的隐私泄露进行有效的度量;最后,用一个案例来说明所提方案的可行性。
中图分类号:
[1]SHANNON C E.A mathematical theory of communication[J].Bell System Technical Journal,1948,27(3):379-423. [2]DÍAZ C,SEYS S,CLAESSENS J,et al.Towards Measuring Anonymity[C]//International Conference on Privacy Enhancing Technologies.Springer-Verlag,2002:54-68. [3]MA Z,KARGL F,WEBER M.Measuring location privacy in V2X communication systems with accumulated information[C]//IEEE International Conference on Mobile Adhoc and Sensor Systems.IEEE,2009:322-331. [4]CHEN X,PANG J.Measuring query privacy in location-based services[C]//ACM Conference on Data and Application Security and Privacy.ACM,2012:49-60. [5]YANG Y,LUTES J,LI F,et al.Stalking online:On user privacy in social networks[C]//ACM Conference on Data and Application Security and Privacy.ACM,2012:37-48. [6]ZHANG X J,GUI X L,FENG Z C,et al.A Quantifying Framework of Query Privacy in Location-Based Service[J].Journal of Xi’an Jiaotong University,2014,48(2):8-13.(in Chinese) 张学军,桂小林,冯志超,等.位置服务中的查询隐私度量框架研究[J].西安交通大学学报,2014,48(2):8-13. [7]PENG C G,DING H F,ZHU Y J,et al.Information Entropy Models and Privacy Metrics for Privacy Protection[J].Journal of Software,2016,27(8):1891-1903.(in Chinese) 彭长根,丁红发,朱义杰,等.隐私保护的信息熵模型及其度量方法[J].软件学报,2016,27(8):1891-1903. [8]LIU D,BAGH A.New Privacy-Preserving Ascending Auction for Assignment Problems[J/OL].http://dx.doi.org/10.2139/ssrn.2883867. [9]DWORK C.Differential privacy[J].Lecture Notes in Computer Science,2006,26(2):1-12. [10]VADHAN S.The Complexity of Differential Privacy[J/OL].http://doi.org/10.1007/978-3-319-57048-8-7. [11]CHATZIKOKOLAKIS K,PALAMIDESSI C,STRONATI M. Constructing elastic distinguish ability metrics for location privacy[J].Proceedings on Privacy Enhancing Technologies,2015,2015(2):156-170. [12]LIU H,KRISHNAMACHARI B,ANNAVARAM M.Game theoretic approach to location sharing with privacy in a community-based mobile safety application[C]//Proceedings of the 11th International Symposium on Modeling,Analysis and Simulation of Wireless and Mobile Systems.ACM,2008:229-238. [13]HUMBERT M,MANSHAEI M H,FREUDIGER J,et al.Tracking Games in Mobile Networks[C]//International Conference on Decision & Game Theory for Security.Springer-Verlag,2010:595-599. [14]CHORPPATH A K,ALPCAN T.Trading privacy with incentives in mobile commerce:A game theoretic approach[J].Pervasive & Mobile Computing,2013,9(4):598-612. [15]ZHOU D D,LI W W,SUN Y Q.Survey on Game Theory Based Privacy Protection[J].Journal of Chinese Computer Systems,2015,36(12):2696-2700.(in Chinese) 周丹丹,李威伟,孙宇清.博弈论隐私保护方法研究综述[J].小型微型计算机系统,2015,36(12):2696-2700. [16]XU L,JIANG C,WANG J,et al.Game theoretic data privacy preservation:Equilibrium and pricing[C]//IEEE International Conference on Communications.IEEE,2015:7071-7076. [17]ZHANG Y X,HE J S,ZHAO B,et al.A Privacy Protection Model Base on Game Theory[J].Chinese Journal of Computers,2016,39(3):615-627.(in Chinese) 张伊璇,何泾沙,赵斌,等.一个基于博弈理论的隐私保护模型[J].计算机学报,2016,39(3):615-627. [18]PANAOUSIS E,LASZKA A,POHL J,et al.Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking[C]//IEEE Computer Society.2016:1006-1013. [19]WU X,DOU W,NI Q.Game theory based privacy preserving analysis in correlated data publication[C]//Australasian Computer Science Week Multiconference.ACM,2017:73. [20]YUAN M,CHEN L,YU P S.Personalized privacy protection in social networks[J].Proceedings of the Vldb Endowment,2010,4(2):141-150. [21]GUO M,LIU Z,WANG H B.Personalized Privacy Preserving Approaches for Multiple Sensitive Attributes in Data Publishing[J/OL].https://doi.org/10.12783/dtetr/ssme-ist2016/3965. [22]FUDENBERG D,TIROLE J.Game Theory[J].Mit Press Books, 2010,1(7):841-846. |
[1] | 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩. 基于分层抽样优化的面向异构客户端的联邦学习 Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients 计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263 |
[2] | 汤凌韬, 王迪, 张鲁飞, 刘盛云. 基于安全多方计算和差分隐私的联邦学习方案 Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy 计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108 |
[3] | 吕由, 吴文渊. 隐私保护线性回归方案与应用 Privacy-preserving Linear Regression Scheme and Its Application 计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190 |
[4] | 姜洋洋, 宋丽华, 邢长友, 张国敏, 曾庆伟. 蜜罐博弈中信念驱动的攻防策略优化机制 Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game 计算机科学, 2022, 49(9): 333-339. https://doi.org/10.11896/jsjkx.220400011 |
[5] | 袁唯淋, 罗俊仁, 陆丽娜, 陈佳星, 张万鹏, 陈璟. 智能博弈对抗方法:博弈论与强化学习综合视角对比分析 Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning 计算机科学, 2022, 49(8): 191-204. https://doi.org/10.11896/jsjkx.220200174 |
[6] | 王健. 基于隐私保护的反向传播神经网络学习算法 Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving 计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155 |
[7] | 胥昊, 曹桂均, 闫璐, 李科, 王振宏. 面向铁路集装箱的高可靠低时延无线资源分配算法 Wireless Resource Allocation Algorithm with High Reliability and Low Delay for Railway Container 计算机科学, 2022, 49(6): 39-43. https://doi.org/10.11896/jsjkx.211200143 |
[8] | 李利, 何欣, 韩志杰. 群智感知的隐私保护研究综述 Review of Privacy-preserving Mechanisms in Crowdsensing 计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077 |
[9] | 王美珊, 姚兰, 高福祥, 徐军灿. 面向医疗集值数据的差分隐私保护技术研究 Study on Differential Privacy Protection for Medical Set-Valued Data 计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032 |
[10] | 吕由, 吴文渊. 基于同态加密的线性系统求解方案 Linear System Solving Scheme Based on Homomorphic Encryption 计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124 |
[11] | 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉. 基于差分隐私的K-means算法优化研究综述 Review of K-means Algorithm Optimization Based on Differential Privacy 计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008 |
[12] | 金华, 朱靖宇, 王昌达. 视频隐私保护技术综述 Review on Video Privacy Protection 计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047 |
[13] | 雷羽潇, 段玉聪. 面向跨模态隐私保护的AI治理法律技术化框架 AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection 计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011 |
[14] | 李少辉, 张国敏, 宋丽华, 王秀磊. 基于不完全信息博弈的反指纹识别分析 Incomplete Information Game Theoretic Analysis to Defend Fingerprinting 计算机科学, 2021, 48(8): 291-299. https://doi.org/10.11896/jsjkx.210100148 |
[15] | 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞. 基于用户偏好和位置分布的假位置生成方法 Dummy Location Generation Method Based on User Preference and Location Distribution 计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069 |
|