基于演化博弈的大数据信息泄漏风险访问控制模型设计
DOI:
CSTR:
作者:
作者单位:

作者简介:

通讯作者:

中图分类号:

基金项目:


Design of Access Control Model for Big Data Information Leakage Risk Based on Evolutionary Games
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    大数据信息泄漏会导致网络主机所承担的运行风险增加,严重时下级网络终端会出现无法访问大数据信息服务器的情况。针对上述问题,设计了基于演化博弈的大数据信息泄漏风险访问控制模型。以演化博弈模型为基础,完成对大数据信息均衡点的演化处理,求解信息博弈概率,推导演化博弈模型表达式,从而完善基于演化博弈的大数据信息模糊化处理流程。计算大数据信息泄漏行为的信任度标准,参考信息监控器设置条件,实现对大数据信息泄漏风险的评估。针对风险评估结果,完成大数据信息的访问证据取样,计算访问控制阈值,实现对信息泄漏风险访问的控制,完成基于演化博弈的大数据信息泄漏风险访问控制模型的设计。实验结果表明,所提方法的大数据信息瞬时泄漏量始终小于2.3×1011MB,网络主机所承担的运行风险得到有效控制,下级网络终端不会出现无法访问大数据信息服务器的情况。

    Abstract:

    The leakage of big data information will increase the operational risk borne by the network host. In serious cases, the lower level network terminals will be unable to access the big data information server. To solve the above problems, an access control model of big data information leakage risk based on evolutionary game was designed. Based on the evolutionary game model, complete the evolutionary processing of big data information Equant, solve the information game probability, and derive the expression of the evolutionary game model, so as to improve the big data information fuzzy processing process based on the evolutionary game. Calculate the trust standard of big data information leakage behavior, refer to the information monitor setting conditions, and realize the assessment of big data information leakage risk. According to the risk assessment results, complete the access evidence sampling of big data information, calculate the access control threshold, realize the control of information leakage risk access, and complete the design of big data information leakage risk access control model based on evolutionary game. Experimental results show that the instantaneous leakage of big data information of the proposed method is always less than 2.3×1011MB, the operation risk assumed by the network host is effectively controlled, and the lower level network terminal will not be unable to access the big data information server.

    参考文献
    相似文献
    引证文献
引用本文

周海徽.基于演化博弈的大数据信息泄漏风险访问控制模型设计计算机测量与控制[J].,2024,32(6):139-144.

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2023-06-30
  • 最后修改日期:2023-08-03
  • 录用日期:2023-08-04
  • 在线发布日期: 2024-06-18
  • 出版日期:
文章二维码