{"id":"https://openalex.org/W3048440446","doi":"https://doi.org/10.1155/2020/6515328","title":"Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game","display_name":"Research on the Optimization Management of Cloud Privacy Strategy Based on Evolution Game","publication_year":2020,"publication_date":"2020-08-11","ids":{"openalex":"https://openalex.org/W3048440446","doi":"https://doi.org/10.1155/2020/6515328","mag":"3048440446"},"language":"en","primary_location":{"id":"doi:10.1155/2020/6515328","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6515328","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6515328.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/6515328.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110943448","display_name":"Pan Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Pan Jun Sun","raw_affiliation_strings":["School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, 800 Dongchuan Rd, Minhang District, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, 800 Dongchuan Rd, Minhang District, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5110943448"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.6976,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.81037819,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9787999987602234,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9527999758720398,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9485999941825867,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.824675440788269},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.581902027130127},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5662185549736023},{"id":"https://openalex.org/keywords/game-theory","display_name":"Game theory","score":0.4764980673789978},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.4732511639595032},{"id":"https://openalex.org/keywords/strategy","display_name":"Strategy","score":0.4390102028846741},{"id":"https://openalex.org/keywords/normal-form-game","display_name":"Normal-form game","score":0.43850433826446533},{"id":"https://openalex.org/keywords/jacobian-matrix-and-determinant","display_name":"Jacobian matrix and determinant","score":0.43647754192352295},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34613195061683655},{"id":"https://openalex.org/keywords/sequential-game","display_name":"Sequential game","score":0.33799391984939575},{"id":"https://openalex.org/keywords/mathematical-economics","display_name":"Mathematical economics","score":0.15797460079193115},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11660617589950562},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10634955763816833}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.824675440788269},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.581902027130127},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5662185549736023},{"id":"https://openalex.org/C177142836","wikidata":"https://www.wikidata.org/wiki/Q44455","display_name":"Game theory","level":2,"score":0.4764980673789978},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.4732511639595032},{"id":"https://openalex.org/C88959737","wikidata":"https://www.wikidata.org/wiki/Q1546627","display_name":"Strategy","level":3,"score":0.4390102028846741},{"id":"https://openalex.org/C155930848","wikidata":"https://www.wikidata.org/wiki/Q1069099","display_name":"Normal-form game","level":4,"score":0.43850433826446533},{"id":"https://openalex.org/C200331156","wikidata":"https://www.wikidata.org/wiki/Q506041","display_name":"Jacobian matrix and determinant","level":2,"score":0.43647754192352295},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34613195061683655},{"id":"https://openalex.org/C73795354","wikidata":"https://www.wikidata.org/wiki/Q287618","display_name":"Sequential game","level":3,"score":0.33799391984939575},{"id":"https://openalex.org/C144237770","wikidata":"https://www.wikidata.org/wiki/Q747534","display_name":"Mathematical economics","level":1,"score":0.15797460079193115},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11660617589950562},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10634955763816833},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2020/6515328","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6515328","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6515328.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7795a724fec1453a9c3abd5feb7a5597","is_oa":true,"landing_page_url":"https://doaj.org/article/7795a724fec1453a9c3abd5feb7a5597","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2020/6515328","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/6515328","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/6515328.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3048440446.pdf","grobid_xml":"https://content.openalex.org/works/W3048440446.grobid-xml"},"referenced_works_count":28,"referenced_works":["https://openalex.org/W2061914338","https://openalex.org/W2240450792","https://openalex.org/W2333251438","https://openalex.org/W2339705148","https://openalex.org/W2340190842","https://openalex.org/W2519885165","https://openalex.org/W2569569679","https://openalex.org/W2582259743","https://openalex.org/W2582821769","https://openalex.org/W2604409140","https://openalex.org/W2612172766","https://openalex.org/W2763603347","https://openalex.org/W2775516695","https://openalex.org/W2789266794","https://openalex.org/W2794091135","https://openalex.org/W2799532920","https://openalex.org/W2801962073","https://openalex.org/W2806064618","https://openalex.org/W2884810987","https://openalex.org/W2900734365","https://openalex.org/W2908077968","https://openalex.org/W2912018309","https://openalex.org/W2933915278","https://openalex.org/W2946511964","https://openalex.org/W2952868726","https://openalex.org/W2963492322","https://openalex.org/W3100092374","https://openalex.org/W4211196771"],"related_works":["https://openalex.org/W1473969641","https://openalex.org/W2374666693","https://openalex.org/W2391693198","https://openalex.org/W2910530315","https://openalex.org/W2208861692","https://openalex.org/W2490394040","https://openalex.org/W3091950843","https://openalex.org/W4324137302","https://openalex.org/W3121431328","https://openalex.org/W4294189097"],"abstract_inverted_index":{"Cloud":[0],"computing":[1],"services":[2],"have":[3,154],"great":[4],"convenience,":[5],"but":[6],"privacy":[7,20,46],"security":[8],"is":[9,26,97,112,119,131],"a":[10,41,54],"big":[11],"obstacle":[12],"of":[13,19,22,45,57,87,109,116,141,150,158,165],"popularity.":[14],"In":[15,33,80],"the":[16,30,61,69,76,84,88,92,101,114,127,137,142,151,155,163],"process":[17],"result":[18],"protection":[21,63,111],"cloud":[23],"computing,":[24],"it":[25],"difficult":[27],"to":[28,35,52,82],"choose":[29],"optimal":[31,62,128],"strategy.":[32],"order":[34,81],"solve":[36],"this":[37,166],"problem,":[38],"we":[39],"propose":[40],"quantitative":[42],"weight":[43],"model":[44,56,108,143],"information,":[47],"use":[48],"evolutionary":[49,70,106],"game":[50,55,90,107],"theory":[51],"establish":[53],"attack":[58,110],"protection,":[59],"design":[60],"strategy":[64,130],"selection":[65,129],"algorithm,":[66],"and":[67,126,139,160,162],"make":[68],"stable":[71],"equilibrium":[72,117],"solution":[73],"method":[74],"from":[75],"limited":[77],"rational":[78],"constraint.":[79],"study":[83],"strategic":[85],"dependence":[86],"same":[89,152],"group,":[91],"classical":[93],"dynamic":[94],"replication":[95],"equation":[96],"improved":[98,105],"by":[99,122,146,170],"using":[100],"incentive":[102],"coefficient,":[103],"an":[104],"constructed,":[113],"stability":[115],"point":[118],"further":[120],"analyzed":[121],"Jacobian":[123],"matrix":[124],"method,":[125],"obtained":[132],"under":[133],"different":[134,148],"conditions.":[135],"Finally,":[136],"correctness":[138],"validity":[140],"are":[144,168],"verified":[145],"experiments,":[147],"strategies":[149],"group":[153],"dual":[156],"effects":[157],"promotion":[159],"inhibition,":[161],"advantages":[164],"paper":[167],"shown":[169],"comparing":[171],"with":[172],"other":[173],"articles.":[174]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
