Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game

Cloud computing services have great convenience, but privacy security is a big obstacle of popularity. In the process result of privacy protection of cloud computing, it is difficult to choose the optimal strategy. In order to solve this problem, we propose a quantitative weight model of privacy inf...

Full description

Bibliographic Details
Main Author: Pan Jun Sun
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/6515328
id doaj-7795a724fec1453a9c3abd5feb7a5597
record_format Article
spelling doaj-7795a724fec1453a9c3abd5feb7a55972020-11-25T03:42:44ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/65153286515328Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution GamePan Jun Sun0School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, 800 Dongchuan Rd, Minhang District, Shanghai, ChinaCloud computing services have great convenience, but privacy security is a big obstacle of popularity. In the process result of privacy protection of cloud computing, it is difficult to choose the optimal strategy. In order to solve this problem, we propose a quantitative weight model of privacy information, use evolutionary game theory to establish a game model of attack protection, design the optimal protection strategy selection algorithm, and make the evolutionary stable equilibrium solution method from the limited rational constraint. In order to study the strategic dependence of the same game group, the classical dynamic replication equation is improved by using the incentive coefficient, an improved evolutionary game model of attack protection is constructed, the stability of equilibrium point is further analyzed by Jacobian matrix method, and the optimal selection strategy is obtained under different conditions. Finally, the correctness and validity of the model are verified by experiments, different strategies of the same group have the dual effects of promotion and inhibition, and the advantages of this paper are shown by comparing with other articles.http://dx.doi.org/10.1155/2020/6515328
collection DOAJ
language English
format Article
sources DOAJ
author Pan Jun Sun
spellingShingle Pan Jun Sun
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
Security and Communication Networks
author_facet Pan Jun Sun
author_sort Pan Jun Sun
title Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
title_short Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
title_full Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
title_fullStr Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
title_full_unstemmed Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
title_sort research on the optimization management of cloud privacy strategy based on evolution game
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description Cloud computing services have great convenience, but privacy security is a big obstacle of popularity. In the process result of privacy protection of cloud computing, it is difficult to choose the optimal strategy. In order to solve this problem, we propose a quantitative weight model of privacy information, use evolutionary game theory to establish a game model of attack protection, design the optimal protection strategy selection algorithm, and make the evolutionary stable equilibrium solution method from the limited rational constraint. In order to study the strategic dependence of the same game group, the classical dynamic replication equation is improved by using the incentive coefficient, an improved evolutionary game model of attack protection is constructed, the stability of equilibrium point is further analyzed by Jacobian matrix method, and the optimal selection strategy is obtained under different conditions. Finally, the correctness and validity of the model are verified by experiments, different strategies of the same group have the dual effects of promotion and inhibition, and the advantages of this paper are shown by comparing with other articles.
url http://dx.doi.org/10.1155/2020/6515328
work_keys_str_mv AT panjunsun researchontheoptimizationmanagementofcloudprivacystrategybasedonevolutiongame
_version_ 1715138234705510400