全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2018 

基于安全博弈模型的隐私保护方法

Keywords: 隐私保护,博弈论,安全博弈模型,纳什均衡

Full-Text   Cite this paper   Add to My Lib

Abstract:

采用博弈论方法解决隐私保护问题成为一种新的研究手段.不同于传统的隐私保护方法,基于博弈论的隐私保护方法通过机制设计、描述参与方的收益和代价、模拟他们的理性选择过程、分析博弈纳什均衡可以找到平衡各方收益最大化的最佳解决方案.本文对三类典型的信息安全博弈模型即确定性安全博弈模型、随机安全博弈模型和具有有限信息的安全博弈模型进行描述和形式化定义;然后,面向不同应用场景对基于三类信息安全博弈模型所提出的隐私保护方法进行分类论述,并对此进行分析比较,讨论其优点和局限性;最后,指出现有方法所面临挑战以及今后研究方向

References

[1]  朱建明,RAGHUNATHAN S.基于博弈论的信息安全技术评价模型[J].计算机学报,2009,32(4):828-834.ZHU J M,RAGHUNATHAN S.Evaluation model of information security technology based on game theoretic[J].Journal of Computers,2009,32(4):828-834(Ch).
[2]  田有亮,马建峰,彭长根,等.秘密共享体制的博弈论分析[J].电子学报,2011,39(12):2790-2795.TIAN Y L,MA J F,PENG C G,et al.Game-theoretic analysis of secret sharing scheme[J].Acta Electronica Sinica,2011,39(12):2790-2795(Ch).
[3]  彭长根,田有亮,刘海,等.密码学与博弈论的交叉研究综述[J].密码学报,2017,4(1):1-15.DOI:10.13868/j.cnki.jcr.000158.PENG C G,TIAN Y L,LIU H,et al.A survey on the intersection of cryptography and game theory[J].Journal of Cryptologic Research,2017,4(1):1-15.DOI:10.13868/j.cnki.jcr.000158(Ch).
[4]  XIANG Y,WANG L.A game-theoretic study of load redistribution attack and defense in power systems[J].Electric Power Systems Research,2017,151:12-25.
[5]  FIELDER A,PANAOUSIS E,MALACARIA P,et al.Decision support approaches for cyber security investment[J].Decision Support Systems,2016,86:13-23.
[6]  DO C T,TRAN N H,HONG C,et al.Game theory for cyber security and privacy[J].ACM Com put in g Surveys(CSUR),2017,50(2):30.
[7]  OROJLOO H,AZGOMI M A.A game-theoretic approach to model and quantify the security of cyberphysical systems[J].Computers in Industry,2017,88:44-57.
[8]  D'ACQUISTO G,FLAMINI M,NALDI M.A game-theoretic formulation of security investment decisions under ex-ante regulation[C]//In formation Security and Privacy Research.Berlin:Springer,2012:412-423.
[9]  何建琼,田有亮,周凯.可证明安全的社交网络隐私保护方案[J].网络与信息安全学报,2017,2(8):62-67.HE J Q,TIAN Y L,ZHOU K.Provably secure social network privacy-preserving scheme[J].Chinese Journal o f Network and In formation Security,2016,2(8):62-67(Ch).
[10]  姜伟,方滨兴,田志宏,等.基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4):817-827.JIANG W,FANG B X,TIAN Z H et al.Evaluating network security and optimal active defense based on attack-defense game model[J].Chinese J ournal of Computers,2009,32(4):817-827(Ch).
[11]  NICOL D M,SANDERS W H,TRIVEDI K S.Model-based evaluation:from dependability to security[J].IEEE Transactions on Dependable and Secure Computing,2004,1(1):48-65.
[12]  GOSSNER O.Repeated Games Played by Cryptographically Sophisticated Players[M].Belgium:Universite Catholique de Louvain,1998:10-16.
[13]  ASOKAN N,SHOUP V,WAIDNER M.Optimistic fair exchange of digital signatures[J].IEEE Journal on Selected Areas in communications,2000,18(4):593-610.
[14]  周丹丹,李威伟,孙宇清.博弈论隐私保护方法研究综述[J].小型微型计算机系统,2015,36(12):2696-2700.ZHOU D D,LI W W,SUN Y Q.Survey on game theory based on privacy protection[J].Journal of Chinese Computer Systems,2015,36(12):2696-2700(Ch).
[15]  PAWLICK J,ZHU Q.A mean-field stackelberg game approach for obfuscation adoption in empirical risk minimization[EB/OL].[2017-06-08].https://arxiv.org/pdf/1706.02693.pdf.
[16]  FARRAJ A,HAMMAD E,A1 D A,et al.A gametheoretic analysis of cyber switching attacks and mitigation in smart grid systems[J].IEEE Transactions on Smart Grid,2016,7(4):1846-1855.
[17]  LASZKA A,JOHNSON B,GROSSKLAGS J.Mitigation of targeted and non-targeted covert attacks as a timing game[C]//Decision and Game Theory for Security.Switzerland:Springer International Publishing,2013:175-191.DOI:10.1007/978-3-319-02786-9_11.
[18]  RAYA M,SHOKRI R,HUBAUX J P.On the tradeoff between trust and privacy in wireless ad hoc networks[C]//Proceedings o f the Third ACM Conference on Wireless Network Security.New York:ACM,2010:75-80.
[19]  万盛,李凤华,牛犇,等.位置隐私保护技术研究进展[J].通信学报,2017,37(12):124-141.DOI:10.11959/j.issn.1000-436x.2016279.WAN S,LI F H,NIU B,et al.Research progress of location privacy-preserving techniques[J].Journal on communications,2016,37(12):124-141.DOI:10.11959/j.issn.1000-436x.2016279(C.h).
[20]  吴莎莎,熊金波,叶帼华,等.移动互联网环境下基于假位置的位置隐私保护研究[J].信息网络安全,2016(10):54-59.DOI:10.3969/j.issn.1671-1122.2016.10.009.WU S S,XIONG J B,YE G H,et al.Research on location privacy protection based on dummy locations in mobile internet environment[J].Netin fo Security,2016(10):54-59.DOI:10.3969/j.issn.1671-1122.2016.10.009(Ch).
[21]  王彩梅,郭亚军,郭艳华.位置服务中用户轨迹的隐私度量[J].软件学报,2012,23(2):352-360.WANG C M,GUO Y J,GUO Y H.Privacy metric for user's trajectory in location-based services[J].Journal of software,2012,23(2):352-360(Ch).
[22]  SHOKRI R,THEODORAKOPOULOS G,TRONCOSO C,et al.Protecting location privacy:Optimal strategy against localization attacks[C]//Proceedings of the 2012 ACM Conference on Computer and Communications Security.New York:ACM,2012:617-627.
[23]  彭长根,丁红发,朱义杰,等.隐私保护的信息熵模型及其度量方法[J].软件学报,2016,27(8):1891-1903.PENG C G,DING H F,ZHU Y J,et al.Information entropy models and privacy metrics methods for privacy protection[J].Journal of Software,2016,27(8):1891-1903(Ch).
[24]  WANG Y,WANG Y,LIU J,et al.A survey of game theoretic methods for cyber security[C/OL].[2017-02-22].https://www.researchgate.net/publication/308173085.DOI:10.1109/DSC.2016.90.
[25]  AVIZIENIS A,LAPRIE J C,RANDELL B,et al.Basic concepts and taxonomy of dependable and secure computing[J].IEEE Transactions on Dependable and Secure Computing,2004,1(1):11-33.
[26]  王元卓,林闯,程学旗,等.基于随机博弈模型的网络攻防量化分析方法[J].计算机学报,2010,33(9):1748-1762.WANG Y Z,LIN C,CHENG X Q,et al.Analysis for network attack-defense based on stochastic game model[J].Chinese Journal of Computers,2010,33(9):1748-1762(Ch).
[27]  周凯,彭长根,何建琼,等.可证明安全的LBS中连续查询的轨迹隐私保护方案[J].信息网络安全,2017(1):007.DOI:10.3969/j.issn.1671-1122.2017.01.007.ZHOU K,PENG C G,HE J Q,et al.Provable secure trajectory privacy preserving scheme for continuous queries in location-based services[J].Netinfo Security,2017(1):43-47.DOI:10.3969/j.issn.1671-1122.2017.01.007(Ch).
[28]  朱义杰,彭长根,李甲帅,等.一种结合查询隐私和位置隐私的LBS隐私度量框架[J].信息网络安全,2016(2):47-53.DOI:10.3969/j.issn.1671-1122.2016.02.008.ZHU Y J,PENG C G,LI J S,et al.A framework of privacy metric in LBS combining query privacy with location privacy[J].Netin fo Security,2016(2):47-53.DOI:10.3969/j.issn.1671-1122.2016.02.008(Ch).
[29]  DO C T,TRAN N H,HONG C,et al.Game theory for cyber security and privacy[J].ACM Computing Surveys(CSUR),2017,50(2):30.
[30]  MA R,XIONG J B,LIN M W,et al.Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory[C/OL].[2017-03-15].http://ieeexplore.ieee.org/abstract/document/8029545/.DOI:10.1109/Trustcom/BigDataSE/ICESS.2017.342.
[31]  MYERSON R B.Game Theory:Analysis Conflict[M].Cambridge:Harvard University Press,2013.
[32]  BASAR T,OLDER G J.Dynamic Noncooperative Game Theory[M].Philadelphia:Society for Industrial and Applied Mathematics,1998:265-363.
[33]  MANSHAEI M H,ZHU Q,ALPCAN T,et al.Game theory meets network security and privacy[J].ACM Com puting Surveys(CSUR),2013,45(3):25.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133