Rational computing protocol based on fuzzy theory

被引:0
|
作者
Yilei Wang
Tao Li
Lufeng Chen
Ping Li
Ho-fung Leung
Zhe Liu
Qiuliang Xu
机构
[1] Ludong University,School of Information Science and Electrical Engineering
[2] Fujian Normal University,Fujian Provincial Key Laboratory of Network Security and Cryptology
[3] Sun Yat-Sen University,School of Mathematics and Computational Science
[4] The Chinese University of Hong Kong,Department of Computer Science and Engineering
[5] University of Luxembourg,Laboratory of Algorithmics, Cryptology and Security
[6] Shandong University,School of Computer Science and Technology
来源
Soft Computing | 2016年 / 20卷
关键词
Game theory; Private type; Cloud computing; Fuzzy set; Cooperation;
D O I
暂无
中图分类号
学科分类号
摘要
Secure multi-party computing (SMPC) is often used to solve security problems in cloud computing. Rational SMPC is a kind of SMPC in the presence of rational parties, who wish to maximize their utilities. Previous works about rational SMPC only studied the security properties under complete information scenario, where parties’ types are common knowledge. However, parties in practical applications have private types, which is unknown to others. This scenario is called incomplete information. In this paper, rational parties are allowed to have private types, which affect their utilities. Previously, rational parties obtain expected utilities due to unknown private types under incomplete information scenario. However, rational parties prefer to obtain pure utilities in actual life. To solve this contradiction, we use fuzzy theory to confirm the private type of his opponent; then they execute the protocol as if they know the private types just like the execution under complete information scenario. Consequently, they obtain pure utilities other than expected utility. In addition, our protocol can reduce round complexity than previous ones. Consequently, it will improve the security level and efficiency of cloud computing.
引用
收藏
页码:429 / 438
页数:9
相关论文
共 50 条
  • [21] Heterogeneous Fuzzy Based Clustering Protocol
    Mohan, Chander
    Suman
    Kumar, Ashok
    2013 IEEE SECOND INTERNATIONAL CONFERENCE ON IMAGE INFORMATION PROCESSING (ICIIP), 2013, : 601 - 606
  • [22] Towards a Theory of Cloud Computing in the Protocol-composition Framework
    Zhu, Huafei
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 758 - 762
  • [23] Granular Computing Model Based on Quantum Computing Theory
    Hu, Jun
    Guan, Chun
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 157 - 160
  • [24] Fuzzy Sets Theory Applied for Computing Global Solar Irradiation
    St Boata, R.
    Paulescu, M.
    Tulcan-Paulescu, E.
    Gravila, P.
    PHYSICS CONFERENCE (TIM-10), 2011, 1387
  • [25] Fuzzy Theory in Fog Computing: Review, Taxonomy, and Open Issues
    Al-Araji, Zaid Jasim
    Ahmad, Sharifah Sakinah Syed
    Kausar, Nasreen
    Farhani, Anis
    Ozbilge, Ebru
    Cagin, Tonguc
    IEEE ACCESS, 2022, 10 : 126931 - 126956
  • [26] A Kind of Application of Fuzzy Theory : Stock Market Rational Investment Model
    Zhang, Dewei
    PROCEEDINGS OF THE 2015 JOINT INTERNATIONAL MECHANICAL, ELECTRONIC AND INFORMATION TECHNOLOGY CONFERENCE (JIMET 2015), 2015, 10 : 358 - 361
  • [27] The representations of fuzzy concepts based on the fuzzy matrix theory and the AFS theory
    Liu, XD
    Zhu, KJ
    Huang, HZ
    PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON INTELLIGENT CONTROL, 2003, : 1006 - 1011
  • [28] Granular computing based on fuzzy similarity relations
    Chen Degang
    Yang Yongping
    Wang Hui
    SOFT COMPUTING, 2011, 15 (06) : 1161 - 1172
  • [29] Fuzzy Clustering Based on Cloud and Flog Computing
    Kupriyanov, M. S.
    Holod, I. I.
    Shorov, A., V
    PROCEEDINGS OF 2019 XXII INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND MEASUREMENTS (SCM), 2019, : 116 - 120
  • [30] Granular computing based on fuzzy similarity relations
    Chen, De-Gang
    Liu, Jian-Qi
    Tsang, Eric C. C.
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3667 - +