Computer Science ›› 2018, Vol. 45 ›› Issue (6): 130-134.doi: 10.11896/j.issn.1002-137X.2018.06.022

• Information Security • Previous Articles     Next Articles

Privacy Protection Model and Privacy Metric Methods Based on Privacy Preference

ZHANG Pan-pan1,2,4, PENG Chang-gen2,3,4,5, HAO Chen-yan1,2,4   

  1. College of Mathematics and Statistics,Guizhou University,Guiyang 550025,China1;
    Guizhou Provincial Key Laboratory of Big Data,Guizhou University,Guiyang 550025,China2;
    College of Computer Science and Technology,Guizhou University,Guiyang 550025,China3;
    Institute of Cryptography & Data Security,Guizhou University,Guiyang 550025,China4;
    Guangzhou Provincial Key Laboratory of Information Security,Guangzhou 510006,China5
  • Received:2017-05-21 Online:2018-06-15 Published:2018-07-24

Abstract: The balance between privacy protection and service quality is an issue remained to be solved.This paper proposed a game metric model based on privacy preference.Firstly,the formal definition of the user’s privacy preference was proposed,and a method of quantifying privacy preference was proposed.On the basis of this,the service provider’s strategy selection based on privacy preference was analyzed and the privacy metric model based on game theory was put forward,the strategy entropy was used to measure the user privacy disclosure under the mixed strategy,which can comprehensively consider user’s privacy preferences on the service provider’s game strategy and effectively measure user’sprivacy leak.Finally,the feasibility was demonstrated through a case.

Key words: Nash equilibrium, Privacy preference, Privacy protection, Strategy entropy

CLC Number: 

  • TP309
[1]SHANNON C E.A mathematical theory of communication[J].Bell System Technical Journal,1948,27(3):379-423.
[2]DÍAZ C,SEYS S,CLAESSENS J,et al.Towards Measuring Anonymity[C]//International Conference on Privacy Enhancing Technologies.Springer-Verlag,2002:54-68.
[3]MA Z,KARGL F,WEBER M.Measuring location privacy in V2X communication systems with accumulated information[C]//IEEE International Conference on Mobile Adhoc and Sensor Systems.IEEE,2009:322-331.
[4]CHEN X,PANG J.Measuring query privacy in location-based services[C]//ACM Conference on Data and Application Security and Privacy.ACM,2012:49-60.
[5]YANG Y,LUTES J,LI F,et al.Stalking online:On user privacy in social networks[C]//ACM Conference on Data and Application Security and Privacy.ACM,2012:37-48.
[6]ZHANG X J,GUI X L,FENG Z C,et al.A Quantifying Framework of Query Privacy in Location-Based Service[J].Journal of Xi’an Jiaotong University,2014,48(2):8-13.(in Chinese)
[7]PENG C G,DING H F,ZHU Y J,et al.Information Entropy Models and Privacy Metrics for Privacy Protection[J].Journal of Software,2016,27(8):1891-1903.(in Chinese)
[8]LIU D,BAGH A.New Privacy-Preserving Ascending Auction for Assignment Problems[J/OL].
[9]DWORK C.Differential privacy[J].Lecture Notes in Computer Science,2006,26(2):1-12.
[10]VADHAN S.The Complexity of Differential Privacy[J/OL].
[11]CHATZIKOKOLAKIS K,PALAMIDESSI C,STRONATI M. Constructing elastic distinguish ability metrics for location privacy[J].Proceedings on Privacy Enhancing Technologies,2015,2015(2):156-170.
[12]LIU H,KRISHNAMACHARI B,ANNAVARAM M.Game theoretic approach to location sharing with privacy in a community-based mobile safety application[C]//Proceedings of the 11th International Symposium on Modeling,Analysis and Simulation of Wireless and Mobile Systems.ACM,2008:229-238.
[13]HUMBERT M,MANSHAEI M H,FREUDIGER J,et al.Tracking Games in Mobile Networks[C]//International Conference on Decision & Game Theory for Security.Springer-Verlag,2010:595-599.
[14]CHORPPATH A K,ALPCAN T.Trading privacy with incentives in mobile commerce:A game theoretic approach[J].Pervasive & Mobile Computing,2013,9(4):598-612.
[15]ZHOU D D,LI W W,SUN Y Q.Survey on Game Theory Based Privacy Protection[J].Journal of Chinese Computer Systems,2015,36(12):2696-2700.(in Chinese)
[16]XU L,JIANG C,WANG J,et al.Game theoretic data privacy preservation:Equilibrium and pricing[C]//IEEE International Conference on Communications.IEEE,2015:7071-7076.
[17]ZHANG Y X,HE J S,ZHAO B,et al.A Privacy Protection Model Base on Game Theory[J].Chinese Journal of Computers,2016,39(3):615-627.(in Chinese)
[18]PANAOUSIS E,LASZKA A,POHL J,et al.Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking[C]//IEEE Computer Society.2016:1006-1013.
[19]WU X,DOU W,NI Q.Game theory based privacy preserving analysis in correlated data publication[C]//Australasian Computer Science Week Multiconference.ACM,2017:73.
[20]YUAN M,CHEN L,YU P S.Personalized privacy protection in social networks[J].Proceedings of the Vldb Endowment,2010,4(2):141-150.
[21]GUO M,LIU Z,WANG H B.Personalized Privacy Preserving Approaches for Multiple Sensitive Attributes in Data Publishing[J/OL].
[22]FUDENBERG D,TIROLE J.Game Theory[J].Mit Press Books, 2010,1(7):841-846.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[3] YUAN Wei-lin, LUO Jun-ren, LU Li-na, CHEN Jia-xing, ZHANG Wan-peng, CHEN Jing. Methods in Adversarial Intelligent Game:A Holistic Comparative Analysis from Perspective of Game Theory and Reinforcement Learning [J]. Computer Science, 2022, 49(8): 191-204.
[4] XU Hao, CAO Gui-jun, YAN Lu, LI Ke, WANG Zhen-hong. Wireless Resource Allocation Algorithm with High Reliability and Low Delay for Railway Container [J]. Computer Science, 2022, 49(6): 39-43.
[5] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[6] JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313.
[7] LEI Yu-xiao , DUAN Yu-cong. AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection [J]. Computer Science, 2021, 48(9): 9-20.
[8] LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299.
[9] GUO Rui, LU Tian-liang, DU Yan-hui. Source-location Privacy Protection Scheme Based on Target Decision in WSN [J]. Computer Science, 2021, 48(5): 334-340.
[10] WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551.
[11] LI Yu, DUAN Hong-yue, YIN Yu-yu, GAO Hong-hao. Survey of Crowdsourcing Applications in Blockchain Systems [J]. Computer Science, 2021, 48(11): 12-27.
[12] YU Qi-long, LU Ning, SHI Wen-bo. Traceable Mixing Scheme for Bitcoin [J]. Computer Science, 2021, 48(11): 72-78.
[13] WEI Li-qi, ZHAO Zhi-hong, BAI Guang-wei, SHEN Hang. Location Privacy Game Mechanism Based on Generative Adversarial Networks [J]. Computer Science, 2021, 48(10): 266-271.
[14] YU Xue-yong, CHEN Tao. Privacy Protection Offloading Algorithm Based on Virtual Mapping in Edge Computing Scene [J]. Computer Science, 2021, 48(1): 65-71.
[15] LI Yan, SHEN De-rong, NIE Tie-zheng, KOU Yue. Multi-keyword Semantic Search Scheme for Encrypted Cloud Data [J]. Computer Science, 2020, 47(9): 318-323.
Full text



No Suggested Reading articles found!