Privacy-Preserving in Edge Computing by Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang

Privacy-Preserving in Edge Computing by Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang

Author:Longxiang Gao & Tom H. Luan & Bruce Gu & Youyang Qu & Yong Xiang
Language: eng
Format: epub
ISBN: 9789811621994
Publisher: Springer Singapore


(3.5)

(3.6)

Since both the user and adversary follow their best approach policies to maximize the individual utilities, in this stage, we use the best strategy pair, which is , and all states s ∈ S.

According to game theory and the NE formulation, given a dynamic zero-sum stochastic game, we define state s ∈ S. The best strategy for pair is described as

(3.7)

where , and , for all υ adv and υ user.

In the context privacy game, the user attempts to protect to protect their utilities. Meanwhile, the adversary attempts to minimize their G υ(s) by using . According to Eq. 3.5, we have



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.