2016
DOI: 10.1186/s13673-016-0069-y
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative privacy game: a novel strategy for preserving privacy in data publishing

Abstract: Achieving data privacy before publishing has been becoming an extreme concern of researchers, individuals and service providers. A novel methodology, Cooperative Privacy Game (CoPG), has been proposed to achieve data privacy in which Cooperative Game Theory is used to achieve the privacy and is named as Cooperative Privacy (CoP). The core idea of CoP is to play the best strategy for a player to preserve his privacy by himself which in turn contributes to preserving other players privacy. CoP considers each tup… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…Implementing data privacy protection before data release has become a concern for researchers, individuals, and service providers [8]. In recent years, privacy protection for mobile locations has mostly been implemented on the basis of k-anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…Implementing data privacy protection before data release has become a concern for researchers, individuals, and service providers [8]. In recent years, privacy protection for mobile locations has mostly been implemented on the basis of k-anonymity.…”
Section: Related Workmentioning
confidence: 99%
“…In these days, to protect someone's data is one of fundamental requirements for many information services. So, various techniques have been introduced to protect significant information from adversarial trials throughout all steps of data managements including publication [14], processing of personal data [13,15], and data storing [2,6,10]. However, the security against an adversary who obtain partial stored data in a remote storage was not considered in depth since we can counter the adversary by preventing the adversary from accessing to the target data or by using well-known encryption schemes such as AES [1] to encrypt data as in [2].…”
Section: Introductionmentioning
confidence: 99%
“…In addition, a model for evaluating this is presented and the implications of information protection are also checked. This paper suggests well-established enterprise security regulations and information security guideline for the utilization of information protection governance, and it will be helpful for companies and [19]…”
Section: Introductionmentioning
confidence: 99%