Abstract
Due to the gradual application of 5G, Internet of things, the smart transportation and telemedicine, etc., the explosive growth of data volume brings challenges as well as opportunities. While the big data brings more economic benefits, the security issues have become more severe. In response to this problem, this paper proposes a privacy protection method for the big data oriented to user location. It firstly designs a big data system model for user location. Then a game theory based privacy protection algorithm for user location is proposed. The core idea of the algorithm is to allow users who generate virtual paths to obtain some certain benefits through the game method. Furthermore, this paper gives the detailed steps of the algorithm. Finally, the validity of the method is established via simulation and analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yang, Y., Chen, H.: A review of research on privacy protection data mining technology. Microcomput. Appl. 36(08), 41–44+54 (2020)
Zhang, L.: Research on location big data statistics division and release and privacy protection method. Lanzhou University of Technology (2020)
Lei, W.: Research on the information flow and privacy protection of digital library in the big data era. J. Lib. Sci. 41(06), 119–122 (2019)
Yu, G.: Research on key technologies of big data access control. Inner Mongolia University of Science and Technology (2019)
Zhang, J.: Research on differential privacy clustering algorithm based on location big data. Guangdong University of Technology (2019)
Xu, W.: Research and implementation of privacy protection of medical data sharing based on blockchain. Xidian University (2019)
Engineering - Materials Engineering; Research Data from Hainan University Update Understanding of Materials Engineering (A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and Sgx). Technology News Focus (2020)
Xinkangkang. Research on user privacy issues and countermeasures in the era of big data. Collect. Writ. (04), 77–79 (2020)
Xiaming, Z., Yan, Z.: Research on data privacy protection strategy in artificial intelligence applications. Artif. Intell. 04, 76–84 (2020)
Lengauer, T.: Statistical data analysis in the era of big data. Chemie Ingenieur Technik 92(7) (2020)
Dritsas, E., Kanavos, A., Trigka, M., Vonitsanos, G., Sioutas, S., Tsakalidis, A.: Trajectory clustering and k-NN for robust privacy preserving k-NN query processing in GeoSpark. Algorithms 13(8) (2020)
Verhelst, H.M., Stannat, A.W., Mecacci, G.: Machine learning against terrorism: how big data collection and analysis influences the privacy-security dilemma. Sci. Eng. Ethics (2020)
Information Technology - Data Mining; Studies from Royal Melbourne Institute of Technology - RMIT University Add New Findings in the Area of Data Mining (Efficient Privacy Preservation of Big Data for Accurate Data Mining). Information Technology Newsweekly (2020)
Wu, X.: Research on privacy protection and its key technologies in big data environment. Nanjing University (2017)
Hu, H., Xu, J., Ren, C., et al.: Processing private queries over untrusted data cloud through privacy homomorphism. ICDE. IEEE (2011)
Liu, X., Liu, K., Guo, L., et al.: A game-theoretic approach for achieving k-anonymity in Location Based Services. Infocom, IEEE. IEEE (2013)
Acknowledgement
This paper is supported by the science and technology project of State Grid Jiangsu Electric Power Co., Ltd.: “Research and application of key technology for power marketing sensitive data security protection” (Grand No. J2020007).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zou, Y., Yu, P., Shan, C., Wu, M. (2021). Research on the Sensitive Data Protection Method Based on Game Theory Algorithm. In: Tian, Y., Ma, T., Khan, M.K. (eds) Big Data and Security. ICBDS 2020. Communications in Computer and Information Science, vol 1415. Springer, Singapore. https://doi.org/10.1007/978-981-16-3150-4_21
Download citation
DOI: https://doi.org/10.1007/978-981-16-3150-4_21
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3149-8
Online ISBN: 978-981-16-3150-4
eBook Packages: Computer ScienceComputer Science (R0)