مقاله انگلیسی رایگان در مورد بکارگیری تعامل اجتماعی به صورت بازی سه نفره به منظور حفظ حریم خصوصی – الزویر 2019

 

مشخصات مقاله
ترجمه عنوان مقاله بکارگیری تعامل اجتماعی به صورت بازی سه نفره به منظور حفظ حریم خصوصی در اینترنت اشیا
عنوان انگلیسی مقاله Incorporating social interaction into three-party game towards privacy protection in IoT
انتشار مقاله سال 2019
تعداد صفحات مقاله انگلیسی 12 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه الزویر
نوع نگارش مقاله
مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس میباشد
نمایه (index) Scopus – Master Journals List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
4.205 در سال 2018
شاخص H_index 119 در سال 2019
شاخص SJR 0.592 در سال 2018
شناسه ISSN 1389-1286
شاخص Quartile (چارک) Q1 در سال 2018
مدل مفهومی دارد
پرسشنامه ندارد
متغیر دارد
رفرنس دارد
رشته های مرتبط مهندسی کامپیوتر، مهندسی فناوری اطلاعات
گرایش های مرتبط اینترنت و شبکه های گسترده، امنیت اطلاعات، شبکه های کامپیوتری و سامانه های شبکه ای
نوع ارائه مقاله
ژورنال
مجله شبکه های کامپیوتری – Computer Networks
دانشگاه School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, Sichuan, China
کلمات کلیدی اینترنت اشیا، شبکه اجتماعی آنلاین، حریم خصوصی داده ها، تعامل اجتماعی، بازی سه نفره، چانه زنی نش
کلمات کلیدی انگلیسی Internet of Things، Online social network، Data privacy، Social interaction، Three-party game، Nash bargaining
شناسه دیجیتال – doi
https://doi.org/10.1016/j.comnet.2018.11.036
کد محصول E11439
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract

1- Introduction

2- Related work

3- Preliminary

4- Game model and formulation

5- User’s response to privacy leakage

6- Game analysis based on Nash bargaining

7- Conclusion

References

 

بخشی از متن مقاله:

Abstract

By exploiting rich personal information, Internet of Things can provide users with various customized experience and services, improving entertainment, convenience and quality for users’ life. However, unavoidably, these users suffer from serious risk of privacy leakage in the presence of untrusted service provider and malicious adversary. Game theory is treated as one of the most promising methodologies to investigate participants’ incentive, response, and behaviors and has been widely applied to design privacy preserving schemes. Nevertheless, the complex interactions among users, service provider, and adversary are not fully investigated in the existing work. What’s more, users’ social connection and interaction are ignored. In this paper, such complex interactions are modeled as a three-party game for the problem of private data trading in IoT with considering user’s social interaction in online social network. Particularly, data trading between service provider and adversary is formulated to be a Nash bargaining game, for which Nash bargaining solutions are analyzed via both theoretical analysis and numerical experiments. Our analysis can clearly illustrate data trading strategies between service provider and adversary and offer guidance for designing privacy protection scheme in IoT.

Introduction

Internet of Things (IoT) has achieved rapid development and promoted many emerging applications in recent years. With ubiquitous IoT devices, about 2.5 quintillion bytes of data are produced in every day [1]. According to estimation of Ahmed et al. [2], there will be 50 billion IoT devices in 2020. When people use IoT services, a lot of sensitive and personal information is uploaded to the service providers, such as personal profiles, sensors data of mobile terminal, and photos [3]. However, usually, users are not aware of how the service provider use their data and who could access their data clearly. Untrusted service providers may sell user’s data to third-party adversaries for extra profit without user’s permission. In 2018, Facebook admitted that an App related to Cambridge Analytica to harvest personal data of up to 87 million Facebook users without their consent [4]. And some OSNs, including twitter, Myspace and LiveJournal, also share user’s personally identifiable information to third parties [5]. Moreover, the study of Enck et al. [6] found that 15 out of 30 popular network services sent user’s information to remote advertisement or analytics servers. In the presence of untrusted service providers and adversaries, IoT users are suffering from severe risk of privacy leakage. As a new kind of IoT, social IoT (SIoT) has become popular [7,8], where the owners of IoT devices are also connected via online social network (OSN). That is, SIoT can be treated as the integration of IoT and OSN. In 2017, there are 2.46 billion social network users around the world, and it is estimated that the number of users will increase to 3.02 billion in 2021 [9].

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا