Visible to the public A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving

TitleA Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving
Publication TypeConference Paper
Year of Publication2019
AuthorsDing, Hongfa, Peng, Changgen, Tian, Youliang, Xiang, Shuwen
Conference Name2019 International Conference on Networking and Network Applications (NaNA)
KeywordsAccess Control, access control system, access request, Adaptation models, authorisation, Big Data, cloud computing, Computing Theory and Privacy, Control Theory and Privacy, cross-domain environment, cyber physical systems, Cyber-physical systems, data privacy, Estimation, game model, game theoretical analysis, game theoretical risk based access control, game theory, Games, Human Behavior, Information theory, multistage two player game, privacy, privacy breaches, privacy preserving, privacy risk, privacy violation access requests, pubcrawl, Resiliency, risk adaptive access control, risk analysis, Risk based access control, risk based access model, risk value, Scalability, Shannon information, sub-game perfect Nash equilibrium
Abstract

More and more security and privacy issues are arising as new technologies, such as big data and cloud computing, are widely applied in nowadays. For decreasing the privacy breaches in access control system under opening and cross-domain environment. In this paper, we suggest a game and risk based access model for privacy preserving by employing Shannon information and game theory. After defining the notions of Privacy Risk and Privacy Violation Access, a high-level framework of game theoretical risk based access control is proposed. Further, we present formulas for estimating the risk value of access request and user, construct and analyze the game model of the proposed access control by using a multi-stage two player game. There exists sub-game perfect Nash equilibrium each stage in the risk based access control and it's suitable to protect the privacy by limiting the privacy violation access requests.

DOI10.1109/NaNA.2019.00052
Citation Keyding_game_2019