Anonymity meets game theory: secure data integration with malicious participants