Skip to main content

Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game Approach

  • Conference paper
  • First Online:
Security and Privacy in Digital Economy (SPDE 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1268))

Included in the following conference series:

  • 1671 Accesses

Abstract

With the proliferation of users’ sharing behaviors in social networks, the issue of privacy protection has become a major concern of researchers. Most social network platforms provide basic privacy protection mechanisms for users, allowing them to complete privacy settings according to their needs. Each user’s setting can be regarded as a kind of security investment, with different benefits and costs depending on its degree. Due to connections and interactions, users’ investments in privacy protection are interdependent, i.e., users can benefit from their neighbors’ security investments. However, most studies focus on users’ own security investments and ignore their interdependence. Therefore, an interdependent security game approach is proposed to make optimal privacy protection investment decisions for users. This approach first calculates the influence matrix based on users’ interdependence, then constructs the interdependent security game model, and finally solves the Nash equilibrium of this game to derive the optimal investment decisions. The existence and uniqueness of Nash equilibrium are proved, and an iterative method is adopted to calculate the Nash equilibrium solution. The experiments evaluate the interdependent security game model and the iterative method. This work helps each user make accurate investment decision under the influencer of other users on privacy protection, and avoid the over-investment resulting in the waste of resources.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alsarkal, Y., Zhang, N., Xu, H.: Your privacy is your friend’s privacy: Examining interdependent information disclosure on online social networks. In: Proceedings of the 51st Hawaii International Conference on System Sciences (2018)

    Google Scholar 

  2. Arnaboldi, V., La Gala, M., Passarella, A., Conti, M.: Information diffusion in distributed osn: the impact of trusted relationships. Peer-to-Peer Netw. Appl. 9(6), 1195–1208 (2016)

    Article  Google Scholar 

  3. Chen, J., Kiremire, A.R., Brust, M.R., Phoha, V.V.: Modeling online social network users’ profile attribute disclosure behavior from a game theoretic perspective. Comput. Commun. 49, 18–32 (2014)

    Article  Google Scholar 

  4. Du, J., Jiang, C., Chen, K.C., Ren, Y., Poor, H.V.: Community-structured evolutionary game for privacy protection in social networks. IEEE Trans. Inf. Forensics Secur. 13(3), 574–589 (2017)

    Article  Google Scholar 

  5. Hu, H., Ahn, G.J., Zhao, Z., Yang, D.: Game theoretic analysis of multiparty access control in online social networks. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. pp. 93–102 (2014)

    Google Scholar 

  6. Humbert, M., Trubert, B., Huguenin, K.: A survey on interdependent privacy. ACM Comput. Surveys (CSUR) 52(6), 1–40 (2019)

    Article  Google Scholar 

  7. Laszka, A., Felegyhazi, M., Buttyan, L.: A survey of interdependent information security games. ACM Comput. Surveys (CSUR) 47(2), 1–38 (2014)

    Article  Google Scholar 

  8. Leskovec, J., Krevl, A.: Snap datasets: Stanford large network dataset collection (2014)

    Google Scholar 

  9. Lv, J., Qiu, W., Wang, Y.: An analysis of games of information security investment based on interdependent security. Chinese J. Manage. Sci. 14(3), 7–12 (2006)

    Google Scholar 

  10. Maskin, E., Tirole, J.: A theory of dynamic oligopoly, iii: Cournot competition. Eur. Econ. Rev. 31(4), 947–968 (1987)

    Article  MathSciNet  Google Scholar 

  11. Panaousis, E., Fielder, A., Malacaria, P., Hankin, C., Smeraldi, F.: Cybersecurity games and investments: a decision support approach. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 266–286. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-12601-2_15

    Chapter  MATH  Google Scholar 

  12. Rathore, S., Sharma, P.K., Loia, V., Jeong, Y.S., Park, J.H.: Social network security: Issues, challenges, threats, and solutions. Inf. Sci. 421, 43–69 (2017)

    Article  Google Scholar 

  13. Squicciarini, A.C., Griffin, C.: An informed model of personal information release in social networking sites. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing. pp. 636–645. IEEE (2012)

    Google Scholar 

  14. Sun, J., Tang, J.: Models and algorithms for social influence analysis. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining. pp. 775–776 (2013)

    Google Scholar 

  15. Tosh, D., Sengupta, S., Kamhoua, C., Kwiat, K., Martin, A.: An evolutionary game-theoretic framework for cyber-threat information sharing. In: 2015 IEEE International Conference on Communications (ICC). pp. 7341–7346. IEEE (2015)

    Google Scholar 

Download references

Acknowledgments

This work is supproted by National Key Research and Development Plan in China (2018YFC0830500), National Natural Science Foundation of China (U1636105).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Pan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, Y., Pan, L., Liu, F. (2020). Making Privacy Protection Investment Decisions in Social Networks: An Interdependent Security Game Approach. In: Yu, S., Mueller, P., Qian, J. (eds) Security and Privacy in Digital Economy. SPDE 2020. Communications in Computer and Information Science, vol 1268. Springer, Singapore. https://doi.org/10.1007/978-981-15-9129-7_48

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9129-7_48

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9128-0

  • Online ISBN: 978-981-15-9129-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics