Research Article
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
Algorithm 1
Optimal privacy strategy selection.
| Input: cloud computing attack-protect game tree. | | Output: optimal privacy protect strategy. | (1) | Initialization | (2) | Constructing protector’s space set | (3) | Constructing an optional strategy space set for protectors | (4) | According to the strategy selection of the adversary, a reasonable protect strategy is selected by probability , and | (5) | For attack –protect strategy , we get the payoff value of protect strategy. | (6) | Calculating of the protect strategy. | (7) | Calculating the average payoffs of the protector . | (8) | Establishing protector’s dynamic replication equation . | (9) | Computing equilibrium solution of . | (10) | Output privacy protect strategy. |
|