Skip to main content

Research on the Sensitive Data Protection Method Based on Game Theory Algorithm

  • Conference paper
  • First Online:
Big Data and Security (ICBDS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1415))

Included in the following conference series:

  • 906 Accesses

Abstract

Due to the gradual application of 5G, Internet of things, the smart transportation and telemedicine, etc., the explosive growth of data volume brings challenges as well as opportunities. While the big data brings more economic benefits, the security issues have become more severe. In response to this problem, this paper proposes a privacy protection method for the big data oriented to user location. It firstly designs a big data system model for user location. Then a game theory based privacy protection algorithm for user location is proposed. The core idea of the algorithm is to allow users who generate virtual paths to obtain some certain benefits through the game method. Furthermore, this paper gives the detailed steps of the algorithm. Finally, the validity of the method is established via simulation and analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yang, Y., Chen, H.: A review of research on privacy protection data mining technology. Microcomput. Appl. 36(08), 41–44+54 (2020)

    Google Scholar 

  2. Zhang, L.: Research on location big data statistics division and release and privacy protection method. Lanzhou University of Technology (2020)

    Google Scholar 

  3. Lei, W.: Research on the information flow and privacy protection of digital library in the big data era. J. Lib. Sci. 41(06), 119–122 (2019)

    Google Scholar 

  4. Yu, G.: Research on key technologies of big data access control. Inner Mongolia University of Science and Technology (2019)

    Google Scholar 

  5. Zhang, J.: Research on differential privacy clustering algorithm based on location big data. Guangdong University of Technology (2019)

    Google Scholar 

  6. Xu, W.: Research and implementation of privacy protection of medical data sharing based on blockchain. Xidian University (2019)

    Google Scholar 

  7. Engineering - Materials Engineering; Research Data from Hainan University Update Understanding of Materials Engineering (A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and Sgx). Technology News Focus (2020)

    Google Scholar 

  8. Xinkangkang. Research on user privacy issues and countermeasures in the era of big data. Collect. Writ. (04), 77–79 (2020)

    Google Scholar 

  9. Xiaming, Z., Yan, Z.: Research on data privacy protection strategy in artificial intelligence applications. Artif. Intell. 04, 76–84 (2020)

    Google Scholar 

  10. Lengauer, T.: Statistical data analysis in the era of big data. Chemie Ingenieur Technik 92(7) (2020)

    Google Scholar 

  11. Dritsas, E., Kanavos, A., Trigka, M., Vonitsanos, G., Sioutas, S., Tsakalidis, A.: Trajectory clustering and k-NN for robust privacy preserving k-NN query processing in GeoSpark. Algorithms 13(8) (2020)

    Google Scholar 

  12. Verhelst, H.M., Stannat, A.W., Mecacci, G.: Machine learning against terrorism: how big data collection and analysis influences the privacy-security dilemma. Sci. Eng. Ethics (2020)

    Google Scholar 

  13. Information Technology - Data Mining; Studies from Royal Melbourne Institute of Technology - RMIT University Add New Findings in the Area of Data Mining (Efficient Privacy Preservation of Big Data for Accurate Data Mining). Information Technology Newsweekly (2020)

    Google Scholar 

  14. Wu, X.: Research on privacy protection and its key technologies in big data environment. Nanjing University (2017)

    Google Scholar 

  15. Hu, H., Xu, J., Ren, C., et al.: Processing private queries over untrusted data cloud through privacy homomorphism. ICDE. IEEE (2011)

    Google Scholar 

  16. Liu, X., Liu, K., Guo, L., et al.: A game-theoretic approach for achieving k-anonymity in Location Based Services. Infocom, IEEE. IEEE (2013)

    Google Scholar 

Download references

Acknowledgement

This paper is supported by the science and technology project of State Grid Jiangsu Electric Power Co., Ltd.: “Research and application of key technology for power marketing sensitive data security protection” (Grand No. J2020007).

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zou, Y., Yu, P., Shan, C., Wu, M. (2021). Research on the Sensitive Data Protection Method Based on Game Theory Algorithm. In: Tian, Y., Ma, T., Khan, M.K. (eds) Big Data and Security. ICBDS 2020. Communications in Computer and Information Science, vol 1415. Springer, Singapore. https://doi.org/10.1007/978-981-16-3150-4_21

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-3150-4_21

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-3149-8

  • Online ISBN: 978-981-16-3150-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics