Research Article
Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game
Algorithm 1
Optimal privacy strategy selection.
| | Input: cloud computing attack-protect game tree. | | | Output: optimal privacy protect strategy. | | (1) | Initialization | | (2) | Constructing protector’s space set | | (3) | Constructing an optional strategy space set for protectors | | (4) | According to the strategy selection of the adversary, a reasonable protect strategy is selected by probability , and | | (5) | For attack –protect strategy , we get the payoff value of protect strategy. | | (6) | Calculating of the protect strategy. | | (7) | Calculating the average payoffs of the protector . | | (8) | Establishing protector’s dynamic replication equation . | | (9) | Computing equilibrium solution of . | | (10) | Output privacy protect strategy. |
|