| With the rapid development of the Io T and network technologies,the data has shown an explosive growth trend.The issue of data security processing has attracted widespread attention from scholars.Delegation computing is a kind of data security processing technology,and is an important means to ensure the security and reliability of computing results in the process of task delegation.However,traditional delegation computing has problems such as high cost and low efficiency.The rational delegation computing that combining ideals of delegation computing and game theory provides a new thought to solve the problems in traditional delegation computing.The thesis uses cryptography and game theory as the basic theoretical tools to study the delegation computing method in the big data environment.The specific work is as follows:(1)Rational security model of delegation computing.Aiming at the issue in reality that rational participants prefer to pursue the maximization of benefits,we propose the rational security model of delegation computing according to the idea of rational cryptography.Firstly,we introduce rational participants in the delegation computing and analyze its behavior strategy and risk preference to design the utility function that satisfies its interests.Secondly,describe the delegation computing algorithm based on fully homomorphic encryption,and construct the rational security model of delegation computing.Finally,we conduct security proofs and experiments on the rational security model of delegation computing.(2)Rational delegation computing protocol based on rational trust model.Aiming at the issues of low efficiency and high cost of traditional delegation computing,we propose a rational delegation computing protocol based on the rational trust model which combines ideas of the rational cryptography and the RTM.Firstly,we construct the rational trust model based on the thought of RTM,and design a utility function that satisfies the interests of participants in the rational delegation computing.Secondly,we use the improved NTRU cryptographic algorithm and Pedersen commitment scheme to design a rational delegation computing protocol.Finally,we conduct security and performance analysis on the protocol,and verify the impact of the life cycle on the utility of the participants through experiments.The experiment results show that the protocol can guarantee the reliability of the computing results effectively.(3)Safe and rational big data delegation auction scheme.Aiming at the security issues in big data auctions,we combine the rational cryptography and the RTM ideas to construct a safe and rational big data delegation auction scheme.Firstly,we construct the big data delegation auction model according to the sealed second-price auction.Secondly,we conduct game analysis for the delegation auction scheme,and encourage participants to implement the auction agreement honestly by setting the reward and punishment function.Finally,we analyze the performance and security of the scheme and the analysis results show that the scheme is safe and has the ability to resist the collusion of participants.And the equilibrium strategy of each bidder in this scheme is to submit the quotation truthfully according to own evaluation set. |