首页 | 本学科首页   官方微博 | 高级检索  
     

基于演化博弈的大数据信息泄漏风险访问控制模型设计
引用本文:周海徽. 基于演化博弈的大数据信息泄漏风险访问控制模型设计[J]. 计算机测量与控制, 2024, 32(6): 139-144
作者姓名:周海徽
摘    要:大数据信息泄漏会导致网络主机所承担的运行风险增加,严重时下级网络终端会出现无法访问大数据信息服务器的情况。针对上述问题,设计了基于演化博弈的大数据信息泄漏风险访问控制模型。以演化博弈模型为基础,完成对大数据信息均衡点的演化处理,求解信息博弈概率,推导演化博弈模型表达式,从而完善基于演化博弈的大数据信息模糊化处理流程。计算大数据信息泄漏行为的信任度标准,参考信息监控器设置条件,实现对大数据信息泄漏风险的评估。针对风险评估结果,完成大数据信息的访问证据取样,计算访问控制阈值,实现对信息泄漏风险访问的控制,完成基于演化博弈的大数据信息泄漏风险访问控制模型的设计。实验结果表明,所提方法的大数据信息瞬时泄漏量始终小于2.3×1011MB,网络主机所承担的运行风险得到有效控制,下级网络终端不会出现无法访问大数据信息服务器的情况。

关 键 词:演化博弈  大数据信息  泄漏风险  访问控制模型  均衡点演化  信任度  信任证据  
收稿时间:2023-06-30
修稿时间:2023-08-03

Design of Access Control Model for Big Data Information Leakage Risk Based on Evolutionary Games
周海徽. Design of Access Control Model for Big Data Information Leakage Risk Based on Evolutionary Games[J]. Computer Measurement & Control, 2024, 32(6): 139-144
Authors:周海徽
Abstract:The leakage of big data information will increase the operational risk borne by the network host. In serious cases, the lower level network terminals will be unable to access the big data information server. To solve the above problems, an access control model of big data information leakage risk based on evolutionary game was designed. Based on the evolutionary game model, complete the evolutionary processing of big data information Equant, solve the information game probability, and derive the expression of the evolutionary game model, so as to improve the big data information fuzzy processing process based on the evolutionary game. Calculate the trust standard of big data information leakage behavior, refer to the information monitor setting conditions, and realize the assessment of big data information leakage risk. According to the risk assessment results, complete the access evidence sampling of big data information, calculate the access control threshold, realize the control of information leakage risk access, and complete the design of big data information leakage risk access control model based on evolutionary game. Experimental results show that the instantaneous leakage of big data information of the proposed method is always less than 2.3×1011MB, the operation risk assumed by the network host is effectively controlled, and the lower level network terminal will not be unable to access the big data information server.
Keywords:Evolutionary game   Big data information   Leakage risk   Access control model   Evolution of Equant   Trust level   Evidence of trust  
点击此处可从《计算机测量与控制》浏览原始摘要信息
点击此处可从《计算机测量与控制》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号