Research Article
A Privacy Protection Model of Data Publication Based on Game Theory
Table 6
Comparison of the two methods.
| P | k-anonymity | Game theory | GCP(%) | time complexity | K | GCP(%) | time complexity | Reduced number of fields |
| 0.5 | 8.60 | | 2 | 27.27 | | 3 | 0.2 | 21.71 | 5 | 36.36 | 4 | 0.08 | 34.59 | 13 | 45.45 | 5 | 0.01 | 54.93 | 100 | 54.54 | 6 | 0.002 | 71.27 | 500 | 63.63 | 7 | 0.001 | 73.81 | 1000 | 72.72 | 8 | 0.0005 | 79.95 | 2000 | 81.81 | 9 |
|
|