Journal on Communications ›› 2018, Vol. 39 ›› Issue (3): 172-180.doi: 10.11959/j.issn.1000-436x.2018051

• Papers • Previous Articles     Next Articles

Game theory based forwarding control method for social network

Fangfang SHAN1,2,Hui LI1,3,Hui ZHU1,3   

  1. 1 School of Cyber Engineering,Xidian University,Xi’an 710071,China
    2 School of Computer Science,Zhongyuan University of Technology,Zhengzhou 450007,China
    3 State Key Laboratory of Integrated Service Network,Xi’an 710071,China
  • Revised:2018-02-27 Online:2018-03-01 Published:2018-04-02
  • Supported by:
    The National Natural Science Foundation of China(61672411);The National Natural Science Foundation of China(U1401251);The National Natural Science Foundation of China(U1504614);The National Key Research and Development Program of China(2017YFB0802201);The National Key Research and Development Program of China(2017YFB0802203);The Natural Science Foundation of Shaanxi Province(2016JM6007)

Abstract:

With the rapid development of mobile communication and internet technology,the social network has become one of the mainstream social means used in people’s daily social life.To maintain and strengthen relationships with friends,users may share personal behavior and feelings through social networks.Forwarding these contents may result in privacy leakage.To help publishers make proper data forwarding decision,the benefits of both sides of the forwarding operation were analyzed,and a game theory based forwarding control method for social network was proposed which could effectively prevent dishonest data forwarding operation.By analyzing the benefits of both sides of forwarding operation and considering historical information,the probability of dishonest data forwarding operation was calculated and it was compared with the threshold set by publisher to make the forwarding decision.The procedure and framework of the game theory based forwarding control method was introduced.The benefits of both sides were defined and analyzed.The game play scenario was presented.Some results of experiments are shown to support that the method is effective and it can protect the security of content in social network.

Key words: social network, data forwarding control, game theory, Nash equilibrium

CLC Number: 

No Suggested Reading articles found!