Skip to main content

Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

Abstract

In the era of context-aware services, users are enjoying remarkable services based on data collected from a multitude of users. However, in order to benefit from these services, users are enduring the risk of leaking private information. Game theory is a powerful method that is utilized to balance such tradeoff problems. The drawback is that most schemes consider the tradeoff problem from the aspect of the users, while the platform is the party that dominates the interaction in reality. There is also an oversight to formulate the interaction occurring between multiple users, as well as the mutual influence between any two parties involved, including the user, platform and adversary. In this paper, we propose a platform-centric two-layer three-party game model to protect the users’ privacy and provide quality of service. One layer focuses on the interactions among the multiple asymmetric users and the second layer considers the influence between any two of the three parties (user, platform, and adversary). We prove that the Nash Equilibrium exists in the proposed game and find the optimal strategy for the platform to provide quality service, while protecting private data, along with interactions with the adversary. Using real datasets, we present simulations to validate our theoretical analysis.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. The Equifax data breach. https://www.ftc.gov/equifax-data-breach

  2. Facebook security breach exposes accounts of 50 million users. https://www.nytimes.com/2018/09/28/technology/facebook-hack-data-breach.html. Accessed 28 Sept 2018

  3. Cai, Z., He, Z.: Trading private range counting over big IoT data. In: The 39th IEEE International Conference on Distributed Computing Systems, July 2019

    Google Scholar 

  4. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Depend. Secure Comput. 15(4), 577–590 (2018)

    Google Scholar 

  5. Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE TNSE 1 (2018)

    Google Scholar 

  6. Cai, Z., Zheng, X., Yu, J.: A differential-private framework for urban traffic flows estimation via taxi companies. IEEE Trans. Ind. Inform. (2019)

    Google Scholar 

  7. Capurso, N., Mei, B., Song, T., Cheng, X., Yu, J.: A survey on key fields of context awareness for mobile devices. JNCA 118, 44–60 (2018)

    Google Scholar 

  8. Clerc, M., Kennedy, J.: The particle swarm - explosion, stability, and convergence in a multidimensional complex space. IEEE TEC 6(1), 58–73 (2002)

    Google Scholar 

  9. Cormode, G., Jha, S., Kulkarni, T., Li, N., Srivastava, D., Wang, T.: Privacy at scale: local differential privacy in practice. In: SIGMOD, pp. 1655–1658 (2018)

    Google Scholar 

  10. Dewri, R.: Local differential perturbations: location privacy under approximate knowledge attackers. IEEE TMC 12(12), 2360–2372 (2013)

    Google Scholar 

  11. Erlingsson, U., Pihur, V., Korolova, A.: Rappor: Randomized aggregatable privacy-preserving ordinal response. In: CCS. ACM (2014)

    Google Scholar 

  12. Filkins, B.: Sensitive data at risk: the SANS 2017 data protection survey, September 2017

    Google Scholar 

  13. Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: Non-cooperative location privacy. TDSC 10(2), 84–98 (2013)

    Google Scholar 

  14. He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)

    Google Scholar 

  15. Hu, Q., Wang, S., Hu, C., Huang, J., Li, W., Cheng, X.: Messages in a concealed bottle: achieving query content privacy with accurate location-based services. IEEE Trans. Veh. Technol. 67(8), 7698–7711 (2018)

    Google Scholar 

  16. Huang, Y., Cai, Z., Bourgeois, A.G.: Search locations safely and accurately: a location privacy protection algorithm with accurate service. J. Netw. Comput. Appl. 103, 146–156 (2018)

    Google Scholar 

  17. Jensen, M.K.: Aggregative games and best-reply potentials. Econ. Theory 43(1), 45–66 (2010)

    Google Scholar 

  18. Jia, Y., Chen, Y., Dong, X., Saxena, P., Mao, J., Liang, Z.: Man-in-the-browser-cache: persisting https attacks via browser cache poisoning. Comput. Secur. 55, 62–80 (2015)

    Google Scholar 

  19. Jugel, U., Jerzak, Z., Hackenbroich, G., Markl, V.: M4: a visualization-oriented time series data aggregation. VLDB 7(10), 797–808 (2014)

    Google Scholar 

  20. Kairouz, P., Oh, S., Viswanath, P.: Extremal mechanisms for local differential privacy. In: Advances in Neural Information Processing Systems, vol. 27, pp. 2879–2887. Curran Associates, Inc., Red Hook (2014)

    Google Scholar 

  21. Karimi Adl, R., Askari, M., Barker, K., Safavi-Naini, R.: Privacy consensus in anonymization systems via game theory. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 74–89. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31540-4_6

    Google Scholar 

  22. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: Privacy beyond k-anonymity and l-diversity. In: ICDE, pp. 106–115, April 2007

    Google Scholar 

  23. Li, W., Song, T., Li, Y., Ma, L., Yu, J., Cheng, X.: A hierarchical game framework for data privacy preservation in context-aware IoT applications. In: 2017 IEEE Symposium on Privacy-Aware Computing (PAC), pp. 176–177, August 2017

    Google Scholar 

  24. Li, W., Hu, C., Song, T., Yu, J., Xing, X., Cai, Z.: Preserving data privacy in context-aware applications through hierarchical game. In: SPAC, Washington DC, USA, September 2018

    Google Scholar 

  25. Liang, Y., Cai, Z., Han, Q., Li, Y.: Location privacy leakage through sensory data. Secur. Commun. Netw. 2017 (2017)

    Google Scholar 

  26. Liang, Y., Cai, Z., Yu, J., Han, Q., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Netw. 32(4), 8–14 (2018)

    Google Scholar 

  27. Liu, C., Wang, S., Ma, L., Cheng, X., Bie, R., Yu, J.: Mechanism design games for thwarting malicious behavior in crowdsourcing applications. In: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, pp. 1–9, May 2017

    Google Scholar 

  28. Liu, X., Liu, K., Guo, L., Li, X., Fang, Y.: A game-theoretic approach for achieving k-anonymity in location based services. In: IEEE INFOCOM, April 2013

    Google Scholar 

  29. Ma, R., Xiong, J., Lin, M., Yao, Z., Lin, H., Ye, A.: Privacy protection-oriented mobile crowdsensing analysis based on game theory. In: IEEE TBDI, pp. 990–995, August 2017

    Google Scholar 

  30. Machanavajjhala, A., Venkitasubramaniam, M., Kifer, D., Gehrke, J.: l-diversity: Privacy beyond k-anonymity. In: ICDE, p. 24, April 2006

    Google Scholar 

  31. Maharjan, S., Zhu, Q., Zhang, Y., Gjessing, S., Basar, T.: Dependable demand response management in the smart grid: a stackelberg game approach. IEEE TSG 4(1), 120–132 (2013)

    Google Scholar 

  32. Mahrsi, M.K.E., Côme, E., Oukhellou, L., Verleysen, M.: Clustering smart card data for urban mobility analysis. IEEE TITSyst. 18(3), 712–728 (2017)

    Google Scholar 

  33. Mao, J., Tian, W., Jiang, J., He, Z., Zhou, Z., Liu, J.: Understanding structure-based social network de-anonymization techniques via empirical analysis. EURASIP JWCN 2018(1), 279 (2018)

    Google Scholar 

  34. Meeusen, W., van Den Broeck, J.: Efficiency estimation from Cobb-Douglas production functions with composed error. Int. Econ. Rev. 18(2), 435–444 (1977)

    Google Scholar 

  35. Miltiadis, M.: The theory of incentives: the principal-agent model. Econ. J. 113(488), F394–F395 (2001)

    Google Scholar 

  36. Pastore, A., Gastpar, M.: Locally differentially-private distribution estimation. In: IEEE ISIT, pp. 2694–2698, July 2016

    Google Scholar 

  37. Qin, Z., Yang, Y., Yu, T., Khalil, I., Xiao, X., Ren, K.: Heavy hitter estimation over set-valued data with local differential privacy. In: CCS. ACM (2016)

    Google Scholar 

  38. Thakurta, A.G., et al.: Emoji frequency detection and deep link frequency (2017)

    Google Scholar 

  39. Vakilinia, I., Tosh, D.K., Sengupta, S.: 3-way game model for privacy-preserving cybersecurity information exchange framework. In: MILCOM, October 2017

    Google Scholar 

  40. Wang, J., Cai, Z., Li, Y., Yang, D., Li, J., Gao, H.: Protecting query privacy with differentially private k-anonymity in location-based services. Pers. Ubiquitous Comput. 22, 453–469 (2018)

    Google Scholar 

  41. Wang, S., Hu, Q., Sun, Y., Huang, J.: Privacy preservation in location-based services. IEEE Commun. Mag. 56(3), 134–140 (2018)

    Google Scholar 

  42. Wang, S., Huang, J., Li, L., Ma, L., Cheng, X.: Quantum game analysis of privacy-leakage for application ecosystems. In: MobiHoc, July 2017

    Google Scholar 

  43. Wang, S., Li, L., Sun, W., Guo, J., Bie, R., Lin, K.: Context sensing system analysis for privacy preservation based on game theory. Sensors 17(2), 339 (2017)

    Google Scholar 

  44. Wu, X., Dou, W., Ni, Q.: Game theory based privacy preserving analysis in correlated data publication. In: ACSW, February 2017

    Google Scholar 

  45. Xu, L., Jiang, C., Qian, Y., Li, J., Zhao, Y., Ren, Y.: Privacy-accuracy trade-off in differentially-private distributed classification: a game theoretical approach. IEEE TBD 1 (2017)

    Google Scholar 

  46. Yi, C., Cai, J.: A priority-aware truthful mechanism for supporting multi-class delay-sensitive medical packet transmissions in e-Health networks. IEEE TMC 16(9), 2422–2435 (2017)

    Google Scholar 

  47. Ying, B., Nayak, A.: Location privacy-protection based on p-destination in mobile social networks: a game theory analysis. In: IEEE CDSC, pp. 243–250, August 2017

    Google Scholar 

  48. Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM, pp. 1–9, May 2017

    Google Scholar 

  49. Zheng, X., Cai, Z., Li, Y.: Data linkage in smart internet of things systems: a consideration from a privacy perspective. IEEE Commun. Mag. 56(9), 55–61 (2018)

    Google Scholar 

  50. Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things J. 4(6), 1868–1878 (2017)

    Google Scholar 

Download references

Acknowledgments

This work is partly supported by the National Science Foundation (NSF) under grant NOs. 1252292, 1741277, 1704287, and 1829674.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, Y., Cai, Z., Bourgeois, A.G. (2019). Privacy Protection for Context-Aware Services: A Two-Layer Three-Party Game Model. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics