Skip to main content

The Functionality-Security-Privacy Game

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 5861))

Abstract

Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, “green ICT services” are those achieving functionality and security with minimum invasion of the privacy of individuals, where such an invasion can be regarded as a kind of pollution as harmful in the long run to their moral welfare as physical pollution is to their physical welfare. Depending on the type of service, individuals can be users, data owners or respondents having supplied data. We show that the conflict between functionality, security and privacy can be viewed as a game between several players whose interests differ. If the game is properly formulated, its equilibria can lead to protocols conciliating the functionality, security and privacy interests of all players.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, R., Srikant, R.: Privacy preserving data mining. In: Proceedings of the ACM SIGMOD, pp. 439–450 (2000)

    Google Scholar 

  2. Barnes, S.B.: A privacy paradox: social networking in the United States. First Monday 11(9) (2006)

    Google Scholar 

  3. Blau, J.: Car talk. IEEE Spectrum 45(10), 16

    Google Scholar 

  4. Carminati, B., Ferrari, E.: Private relationships in social networks. In: Private Data Management PDM 2007. IEEE Press, Los Alamitos (2007)

    Google Scholar 

  5. Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: IEEE Symposium on Foundations of Computer Science (FOCS), pp. 41–50 (1995)

    Google Scholar 

  6. Daza, V., Domingo-Ferrer, J., Sebé, F., Viejo, A.: Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology 58(4), 1876–1886 (2009)

    Article  Google Scholar 

  7. Dodis, Y., Rabin, T.: Cryptography and game theory. In: [19], pp. 181–205

    Google Scholar 

  8. Domingo-Ferrer, J.: A three-dimensional conceptual framework for database privacy. In: Jonker, W., Petković, M. (eds.) SDM 2007. LNCS, vol. 4721, pp. 193–202. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Domingo-Ferrer, J., Viejo, A., Sebé, F., González-Nicolás, Ú.: Privacy homomorphisms for social networks with private relationships. Computer Networks 52, 3007–3016 (2008)

    Article  MATH  Google Scholar 

  10. Domingo-Ferrer, J.: A survey of inference control methods for privacy-preserving data mining. In: Aggarwal, C., Yu, P. (eds.) Privacy-Preserving Data Mining: Models and Algorithms. Advances in Database Systems, vol. 34, pp. 53–80. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. Domingo-Ferrer, J., Solanas, A., Castellà-Roca, J.: h(k)-Private information retrieval from privacy-uncooperative queryable databases. Online Information Review 33(4), 720–744 (2009)

    Google Scholar 

  12. Domingo-Ferrer, J., Bras-Amorós, M., Wu, Q., Manjón, J.: User-private information retrieval based on a peer-to-peer community. Data and Knowledge Engineering (in press, available online doi:10.1016/j.datak.2009.06.004)

    Google Scholar 

  13. Howe, D.C., Nissenbaum, H.: TrackMeNot: Resisting surveillance in web search. In: Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society, pp. 409–428. Oxford University Press, Oxford (2009)

    Google Scholar 

  14. Hundepool, A., Domingo-Ferrer, J., Franconi, L., Giessing, S., Lenz, R., Longhurst, J., Schulte-Nordholt, E., Seri, G., DeWolf, P.-P.: Handbook on Statistical Disclosure Control (version 1.0), Eurostat (CENEX SDC Project Deliverable) (2006)

    Google Scholar 

  15. Hutt, R., Omand, D.: Anti-terror fight will need privacy sacrifice. In: The Independent, February 25 (2009)

    Google Scholar 

  16. Lin, X., Sun, X., Ho, P.H., Shen, X.: GSIS: A secure and privacy preserving protocol for vehicular communications. IEEE Transactions on Vehicular Communications 56(6), 3442–3456 (2007)

    Article  Google Scholar 

  17. Lindell, Y., Pinkas, B.: Privacy-preserving data mining. Journal of Cryptology 15(3), 177–206 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  18. Mackey, E.: A Framework for Understanding Statistical Disclosure Processes, Ph. D. Thesis, University of Manchester (2009)

    Google Scholar 

  19. Nisan, N., Roughgarden, T., Tardos, É., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)

    MATH  Google Scholar 

  20. Raya, M., Aziz, A., Hubaux, J.-P.: Efficient secure aggregation in VANETs. In: Proc. of 3rd Intl. Workshop on Vehicular Ad Hoc Networks-VANET, pp. 67–75.

    Google Scholar 

  21. Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-Theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2009)

    MATH  Google Scholar 

  22. Tardos, É., Vazirani, V.V.: Basic solution concepts and computational issues. In: [19], pp. 3–28

    Google Scholar 

  23. Von Neumann, J., Morgenstern, O.: Theory of Games and Economic Behavior. Princeton University Press, Princeton (1944)

    MATH  Google Scholar 

  24. The Wall Street Journal, 34 (December 1, 2005)

    Google Scholar 

  25. Wu, Q., Domingo-Ferrer, J., González-Nicolás, Ú.: Balanced trustworthiness, safety and privacy in vehicle-to-vehicle communications (manuscript, 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Domingo-Ferrer, J. (2009). The Functionality-Security-Privacy Game. In: Torra, V., Narukawa, Y., Inuiguchi, M. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2009. Lecture Notes in Computer Science(), vol 5861. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04820-3_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04820-3_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04819-7

  • Online ISBN: 978-3-642-04820-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics