计算机科学 ›› 2018, Vol. 45 ›› Issue (6): 130-134.doi: 10.11896/j.issn.1002-137X.2018.06.022

• 信息安全 • 上一篇    下一篇

一种基于隐私偏好的隐私保护模型及其量化方法

张盼盼1,2,4, 彭长根2,3,4,5, 郝晨艳1,2,4   

  1. 贵州大学数学与统计学院 贵阳5500251;
    贵州大学贵州省公共大数据重点实验室 贵阳5500252;
    贵州大学计算机科学与技术学院 贵阳5500253;
    贵州大学密码学与数据安全研究所 贵阳5500254;
    广东省信息安全技术重点实验室 广州5100065
  • 收稿日期:2017-05-21 出版日期:2018-06-15 发布日期:2018-07-24
  • 作者简介:张盼盼(1991-),女,硕士生,主要研究方向为可信计算与信息安全;彭长根(1963-),男,博士,教授,博士生导师,主要研究方向为密码学与信息安全,E-mail:peng_stud@163.com(通信作者);郝晨艳(1990-),女,硕士生,主要研究方向为可信计算与信息安全
  • 基金资助:
    本文受国家自然科学基金(61662009,61363068,61262073),国家密码发展基金(MMJJ20170129),广东省信息安全技术重点实验室(GDXXAQ2016-04),贵州省教育厅青年科技人才成长项目(黔教合KY字[2016]169),贵州省科技基金计划项目(黔科合基础[2016]1023),贵州大学研究生创新基金(研理工2017071,研理工2017068)资助

Privacy Protection Model and Privacy Metric Methods Based on Privacy Preference

ZHANG Pan-pan1,2,4, PENG Chang-gen2,3,4,5, HAO Chen-yan1,2,4   

  1. College of Mathematics and Statistics,Guizhou University,Guiyang 550025,China1;
    Guizhou Provincial Key Laboratory of Big Data,Guizhou University,Guiyang 550025,China2;
    College of Computer Science and Technology,Guizhou University,Guiyang 550025,China3;
    Institute of Cryptography & Data Security,Guizhou University,Guiyang 550025,China4;
    Guangzhou Provincial Key Laboratory of Information Security,Guangzhou 510006,China5
  • Received:2017-05-21 Online:2018-06-15 Published:2018-07-24

摘要: 针对隐私保护与服务质量之间的均衡问题,提出了一种基于隐私偏好的博弈度量模型。首先,对用户的隐私偏好进行形式化定义,根据用户的隐私偏好度提出隐私偏好的量化方法;在此基础上,分析服务提供者基于用户隐私偏好的策略选择并提出基于博弈的隐私度量模型,在混合策略下运用策略熵度量用户隐私的泄露情况,能够全面地考虑用户的隐私偏好对服务提供者博弈策略的影响,并对用户的隐私泄露进行有效的度量;最后,用一个案例来说明所提方案的可行性。

关键词: 策略熵, 纳什均衡, 隐私保护, 隐私偏好

Abstract: The balance between privacy protection and service quality is an issue remained to be solved.This paper proposed a game metric model based on privacy preference.Firstly,the formal definition of the user’s privacy preference was proposed,and a method of quantifying privacy preference was proposed.On the basis of this,the service provider’s strategy selection based on privacy preference was analyzed and the privacy metric model based on game theory was put forward,the strategy entropy was used to measure the user privacy disclosure under the mixed strategy,which can comprehensively consider user’s privacy preferences on the service provider’s game strategy and effectively measure user’sprivacy leak.Finally,the feasibility was demonstrated through a case.

Key words: Nash equilibrium, Privacy preference, Privacy protection, Strategy entropy

中图分类号: 

  • TP309
[1]SHANNON C E.A mathematical theory of communication[J].Bell System Technical Journal,1948,27(3):379-423.
[2]DÍAZ C,SEYS S,CLAESSENS J,et al.Towards Measuring Anonymity[C]//International Conference on Privacy Enhancing Technologies.Springer-Verlag,2002:54-68.
[3]MA Z,KARGL F,WEBER M.Measuring location privacy in V2X communication systems with accumulated information[C]//IEEE International Conference on Mobile Adhoc and Sensor Systems.IEEE,2009:322-331.
[4]CHEN X,PANG J.Measuring query privacy in location-based services[C]//ACM Conference on Data and Application Security and Privacy.ACM,2012:49-60.
[5]YANG Y,LUTES J,LI F,et al.Stalking online:On user privacy in social networks[C]//ACM Conference on Data and Application Security and Privacy.ACM,2012:37-48.
[6]ZHANG X J,GUI X L,FENG Z C,et al.A Quantifying Framework of Query Privacy in Location-Based Service[J].Journal of Xi’an Jiaotong University,2014,48(2):8-13.(in Chinese)
张学军,桂小林,冯志超,等.位置服务中的查询隐私度量框架研究[J].西安交通大学学报,2014,48(2):8-13.
[7]PENG C G,DING H F,ZHU Y J,et al.Information Entropy Models and Privacy Metrics for Privacy Protection[J].Journal of Software,2016,27(8):1891-1903.(in Chinese)
彭长根,丁红发,朱义杰,等.隐私保护的信息熵模型及其度量方法[J].软件学报,2016,27(8):1891-1903.
[8]LIU D,BAGH A.New Privacy-Preserving Ascending Auction for Assignment Problems[J/OL].http://dx.doi.org/10.2139/ssrn.2883867.
[9]DWORK C.Differential privacy[J].Lecture Notes in Computer Science,2006,26(2):1-12.
[10]VADHAN S.The Complexity of Differential Privacy[J/OL].http://doi.org/10.1007/978-3-319-57048-8-7.
[11]CHATZIKOKOLAKIS K,PALAMIDESSI C,STRONATI M. Constructing elastic distinguish ability metrics for location privacy[J].Proceedings on Privacy Enhancing Technologies,2015,2015(2):156-170.
[12]LIU H,KRISHNAMACHARI B,ANNAVARAM M.Game theoretic approach to location sharing with privacy in a community-based mobile safety application[C]//Proceedings of the 11th International Symposium on Modeling,Analysis and Simulation of Wireless and Mobile Systems.ACM,2008:229-238.
[13]HUMBERT M,MANSHAEI M H,FREUDIGER J,et al.Tracking Games in Mobile Networks[C]//International Conference on Decision & Game Theory for Security.Springer-Verlag,2010:595-599.
[14]CHORPPATH A K,ALPCAN T.Trading privacy with incentives in mobile commerce:A game theoretic approach[J].Pervasive & Mobile Computing,2013,9(4):598-612.
[15]ZHOU D D,LI W W,SUN Y Q.Survey on Game Theory Based Privacy Protection[J].Journal of Chinese Computer Systems,2015,36(12):2696-2700.(in Chinese)
周丹丹,李威伟,孙宇清.博弈论隐私保护方法研究综述[J].小型微型计算机系统,2015,36(12):2696-2700.
[16]XU L,JIANG C,WANG J,et al.Game theoretic data privacy preservation:Equilibrium and pricing[C]//IEEE International Conference on Communications.IEEE,2015:7071-7076.
[17]ZHANG Y X,HE J S,ZHAO B,et al.A Privacy Protection Model Base on Game Theory[J].Chinese Journal of Computers,2016,39(3):615-627.(in Chinese)
张伊璇,何泾沙,赵斌,等.一个基于博弈理论的隐私保护模型[J].计算机学报,2016,39(3):615-627.
[18]PANAOUSIS E,LASZKA A,POHL J,et al.Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking[C]//IEEE Computer Society.2016:1006-1013.
[19]WU X,DOU W,NI Q.Game theory based privacy preserving analysis in correlated data publication[C]//Australasian Computer Science Week Multiconference.ACM,2017:73.
[20]YUAN M,CHEN L,YU P S.Personalized privacy protection in social networks[J].Proceedings of the Vldb Endowment,2010,4(2):141-150.
[21]GUO M,LIU Z,WANG H B.Personalized Privacy Preserving Approaches for Multiple Sensitive Attributes in Data Publishing[J/OL].https://doi.org/10.12783/dtetr/ssme-ist2016/3965.
[22]FUDENBERG D,TIROLE J.Game Theory[J].Mit Press Books, 2010,1(7):841-846.
[1] 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩.
基于分层抽样优化的面向异构客户端的联邦学习
Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients
计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263
[2] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[3] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[4] 姜洋洋, 宋丽华, 邢长友, 张国敏, 曾庆伟.
蜜罐博弈中信念驱动的攻防策略优化机制
Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game
计算机科学, 2022, 49(9): 333-339. https://doi.org/10.11896/jsjkx.220400011
[5] 袁唯淋, 罗俊仁, 陆丽娜, 陈佳星, 张万鹏, 陈璟.
智能博弈对抗方法:博弈论与强化学习综合视角对比分析
Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning
计算机科学, 2022, 49(8): 191-204. https://doi.org/10.11896/jsjkx.220200174
[6] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[7] 胥昊, 曹桂均, 闫璐, 李科, 王振宏.
面向铁路集装箱的高可靠低时延无线资源分配算法
Wireless Resource Allocation Algorithm with High Reliability and Low Delay for Railway Container
计算机科学, 2022, 49(6): 39-43. https://doi.org/10.11896/jsjkx.211200143
[8] 李利, 何欣, 韩志杰.
群智感知的隐私保护研究综述
Review of Privacy-preserving Mechanisms in Crowdsensing
计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077
[9] 王美珊, 姚兰, 高福祥, 徐军灿.
面向医疗集值数据的差分隐私保护技术研究
Study on Differential Privacy Protection for Medical Set-Valued Data
计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032
[10] 吕由, 吴文渊.
基于同态加密的线性系统求解方案
Linear System Solving Scheme Based on Homomorphic Encryption
计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124
[11] 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉.
基于差分隐私的K-means算法优化研究综述
Review of K-means Algorithm Optimization Based on Differential Privacy
计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008
[12] 金华, 朱靖宇, 王昌达.
视频隐私保护技术综述
Review on Video Privacy Protection
计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047
[13] 雷羽潇, 段玉聪.
面向跨模态隐私保护的AI治理法律技术化框架
AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection
计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011
[14] 李少辉, 张国敏, 宋丽华, 王秀磊.
基于不完全信息博弈的反指纹识别分析
Incomplete Information Game Theoretic Analysis to Defend Fingerprinting
计算机科学, 2021, 48(8): 291-299. https://doi.org/10.11896/jsjkx.210100148
[15] 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞.
基于用户偏好和位置分布的假位置生成方法
Dummy Location Generation Method Based on User Preference and Location Distribution
计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!