Abstract
With the proliferation of users’ sharing behaviors in social networks, the issue of privacy protection has become a major concern of researchers. Most social network platforms provide basic privacy protection mechanisms for users, allowing them to complete privacy settings according to their needs. Each user’s setting can be regarded as a kind of security investment, with different benefits and costs depending on its degree. Due to connections and interactions, users’ investments in privacy protection are interdependent, i.e., users can benefit from their neighbors’ security investments. However, most studies focus on users’ own security investments and ignore their interdependence. Therefore, an interdependent security game approach is proposed to make optimal privacy protection investment decisions for users. This approach first calculates the influence matrix based on users’ interdependence, then constructs the interdependent security game model, and finally solves the Nash equilibrium of this game to derive the optimal investment decisions. The existence and uniqueness of Nash equilibrium are proved, and an iterative method is adopted to calculate the Nash equilibrium solution. The experiments evaluate the interdependent security game model and the iterative method. This work helps each user make accurate investment decision under the influencer of other users on privacy protection, and avoid the over-investment resulting in the waste of resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alsarkal, Y., Zhang, N., Xu, H.: Your privacy is your friend’s privacy: Examining interdependent information disclosure on online social networks. In: Proceedings of the 51st Hawaii International Conference on System Sciences (2018)
Arnaboldi, V., La Gala, M., Passarella, A., Conti, M.: Information diffusion in distributed osn: the impact of trusted relationships. Peer-to-Peer Netw. Appl. 9(6), 1195–1208 (2016)
Chen, J., Kiremire, A.R., Brust, M.R., Phoha, V.V.: Modeling online social network users’ profile attribute disclosure behavior from a game theoretic perspective. Comput. Commun. 49, 18–32 (2014)
Du, J., Jiang, C., Chen, K.C., Ren, Y., Poor, H.V.: Community-structured evolutionary game for privacy protection in social networks. IEEE Trans. Inf. Forensics Secur. 13(3), 574–589 (2017)
Hu, H., Ahn, G.J., Zhao, Z., Yang, D.: Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. pp. 93–102 (2014)
Humbert, M., Trubert, B., Huguenin, K.: A survey on interdependent privacy. ACM Comput. Surveys (CSUR) 52(6), 1–40 (2019)
Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surveys (CSUR) 47(2), 1–38 (2014)
Leskovec, J., Krevl, A.: Snap datasets: Stanford large network dataset collection (2014)
Lv, J., Qiu, W., Wang, Y.: An analysis of games of information security investment based on interdependent security. Chinese J. Manage. Sci. 14(3), 7–12 (2006)
Maskin, E., Tirole, J.: A theory of dynamic oligopoly, iii: Cournot competition. Eur. Econ. Rev. 31(4), 947–968 (1987)
Panaousis, E., Fielder, A., Malacaria, P., Hankin, C., Smeraldi, F.: Cybersecurity games and investments: a decision support approach. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 266–286. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12601-2_15
Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.S., Park, J.H.: Social network security: Issues, challenges, threats, and solutions. Inf. Sci. 421, 43–69 (2017)
Squicciarini, A.C., Griffin, C.: An informed model of personal information release in social networking sites. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing. pp. 636–645. IEEE (2012)
Sun, J., Tang, J.: Models and algorithms for social influence analysis. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining. pp. 775–776 (2013)
Tosh, D., Sengupta, S., Kamhoua, C., Kwiat, K., Martin, A.: An evolutionary game-theoretic framework for cyber-threat information sharing. In: 2015 IEEE International Conference on Communications (ICC). pp. 7341–7346. IEEE (2015)
Acknowledgments
This work is supproted by National Key Research and Development Plan in China (2018YFC0830500), National Natural Science Foundation of China (U1636105).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Wu, Y., Pan, L., Liu, F. (2020). Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game Approach. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_48
Download citation
DOI: https://doi.org/10.1007/978-981-15-9129-7_48
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9128-0
Online ISBN: 978-981-15-9129-7
eBook Packages: Computer ScienceComputer Science (R0)