skip to main content
10.1145/1454503.1454544acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Game theoretic approach to location sharing with privacy in a community-based mobile safety application

Published: 27 October 2008 Publication History

Abstract

A new generation of community-based social networking mobile applications is emerging. In these applications, there is often a fundamental tension between users' desire for preserving the privacy of their own data and their need for fine-grained information about others. Our work is motivated by a community-based mobile application called Aegis, a personal safety enhancement service based on sharing location information with trusted nearby friends. We model the privacy-participation tradeoffs in this application using a game theoretic formulation. Users in this game are assumed to be self-interested. They prefer to obtain more fine-grained knowledge from others while limiting their own privacy leak (i.e. their own contributions to the game) as much as possible. We design a tit-for-tat mechanism to give user incentives to contribute to the application. We investigate the convergence of two best response dynamics to achieve a non-trivial Nash equilibrium for this game. Further, we propose an algorithm that yields a Pareto optimal Nash equilibrium. We show that this algorithm guarantees polynomial time convergence and can be executed in a distributed manner.

References

[1]
http://en.wikipedia.org/wiki/Mobile phone
[2]
http://news.bbc.co.uk/2/hi/technology/6245798.stm
[3]
http://www.nbc11.com/news/15255056/detail.html
[4]
A. Adams. Multimedia information changes the whole privacy ballgame. In Proceedings of the tenth conference on Computers, freedom and privacy, pages 25--32, 2000.
[5]
A. Agah, S.K. Das, and K. Basu. A game theory based approach for security in wireless sensor networks. In International Conference on Performance, Computing, and Communications, pages 259--263, 2004.
[6]
M. Annavaram, Q. Jacobson and J.P. Shen. HangOut: A Privacy Preserving Social Networking Application Invited paper. To Appear in the workshop on Mobile Devices and Urban Sensing, April, 2008.
[7]
L. Barkhuus, and A.K. Dey. Location-based services for mobile telephony: a study of users? privacy concerns. In Proceedings of the 9th International Conference on Human-Computer Interaction, 2003.
[8]
L. Capra, W. Emmerich, and C. Mascolo. A micro-economic approach to conflict resolution in mobile computing. In Proceedings of the 10th symposium on Foundations of software engineering, pages 31--40, 2002.
[9]
R. Clarke. Internet privacy concerns confirm the case for intervention. Communications of ACM, 42(2):60--67, 1999.
[10]
S. Consolvo, I.E. Smith, T. Matthews, A. LaMarca, J. Tabert, and P. Powledge. Location disclosure to social relations: why, when, & what people want to share. In Proceedings of the conference on Human factors in computing systems, pages 81--90, 2005.
[11]
L.P. Cox, A. Dalton, and V. Marupadi. Smokescreen: flexible privacy controls for presence-sharing. In Proceedings of the 5th international conference on Mobile systems, applications and services, pages 233--245, 2007.
[12]
S.G. Davies. Re-engineering the right to privacy: how privacy has been transformed from a right to a commodity. In Technology and privacy: the new landscape, MIT Press, 1997.
[13]
L. Desmet, W. Joosen, F. Massacci, K. Naliuka, P. Philippaerts, F. Piessens, and D. Vanoverberghel. A flexible security architecture to support third-party applications on mobile devices. In Proceedings of Workshop on Computer security architecture, pages 19--28, 2007.
[14]
N. Eagle and A. Pentland. Reality mining: sensing complex social systems. Personal Ubiquitous Comput., 10(4):255--268, 2006.
[15]
D. Fudenberg and J. Tirole. Game Theory. MIT Press, 1991.
[16]
A.K. Ghosh and T.M. Swaminatha. Software security and privacy risks in mobile e-commerce. Communications of ACM, 44(2):51--57, 2001.
[17]
T. Grandison and M. Sloman. A survey of trust in internet application. IEEE Communications Surveys & Tutorials, (Fourth Quarter), 2000.
[18]
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In Proceedings of the 1st international conference on Mobile systems, applications and services, pages 31--42, 2003.
[19]
B. Hoh, M. Gruteser, H. Xiong, and A. Alrabady. Preserving privacy in gps traces via uncertainty-aware path cloaking. In Proceedings of the 14th ACM conference on Computer and communications security, pages 161--171, 2007.
[20]
B. Hoh, M. Gruteser, M. Annavaram, Q. Jacobson, R. Herring, J. Ban, D. Work, J. Herrera, and A. Bayen. Virtual trip lines for distributed privacy-preserving traffic monitoring. To Appear in Proceedings of the 6th international conference on Mobile systems, applications and services, June, 2008.
[21]
J.I. Hong, J.D. Ng, S. Lederer, and J.A. Landay. Privacy risk models for designing privacy-sensitive ubiquitous computing systems. In Proceedings of the 5th conference on Designing interactive systems, pages 91--100, 2004.
[22]
J.I. Hong and J.A. Landay. An architecture for privacy-sensitive ubiquitous computing. In Proceedings of the 2nd international conference on Mobile systems, applications, and services, pages 177--189, 2004.
[23]
G. Iachello, I. Smith, S. Consolvo, M. Chen, and G.D. Abowd. Developing privacy guidelines for social location disclosure applications and services. In Proceedings of the 2005 symposium on Usable privacy and security, pages 65--76, 2005.
[24]
S. Lederer, J. Mankoff, and A.K. Dey. Who wants to know what when? privacy preference determinants in ubiquitous computing. In extended abstracts on Human factors in computing systems, pages 724--725, 2003.
[25]
H. Liu, B. Krishnamachari, and S. Kapadia. Game Theoretic Tools Applied to Wireless Networks. Encyclopedia of Ad Hoc and Ubiquitous Computing, Editor D. Agrawal, World Scientific Publishers, 2008.
[26]
N.A.Lynch. Distributed Algorithms. Morgan Kaufmann Publisher, 1997.
[27]
A. Mackenzie and L. DaSilva. Game Theory for Wireless Engineers. Morgan & Claypool Publishers, March 2006.
[28]
M.F. Mokbel, C. Chow, and W.G. Aref. The new casper: query processing for location services without compromising privacy. In Proceedings of the 32nd international conference on Very large data bases, pages 763--774. 2006.
[29]
J. Nasar and P. Hecht and R. Wener. Call if You Have Trouble: Mobile Phones and Safety among College Students, In International Journal of Urban and Regional Research, 31(4), pages 863--873, December 2007.
[30]
L. Palen and P. Dourish. Unpacking "privacy" for a networked world. In Proceedings of the conference on Human factors in computing systems, pages 129--136, 2003.
[31]
S. Patil and A. Kobsa. Uncovering privacy attitudes and practices in instant messaging. In Proceedings of the 2005 international conference on Supporting group work, pages 109--112, 2005.
[32]
A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha. Active Collaborations for Trustworthy Data Management in Ad Hoc Networks. In Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005.
[33]
A. Patwardhan, F. Perich, A. Joshi, T. Finin, and T. Yesha. Querying in Packs: Trustworthy Data Management in Ad Hoc Networks. International Journal of Wireless Information Networks, April 2006.
[34]
S. Reddy, J. Burke, D. Estrin, M. Hansen, and M. Srivastava. A framework for data quality and feedback in participatory sensing. In Proceedings of the 5th international conference on Embedded networked sensor systems, pages 417--418, 2007.
[35]
I. Smith, S. Consolvo, J. Hightower, J. Hughes, G. Iachello, A. LaMarca, J. Scott, T. Sohn, and G. Abowd. Social Disclosure of Place: From Location Technology to Communication Practice. In Proceedings of the International Conference on Pervasive Computing, May 2005.
[36]
J. Tang, V. Terziyan and J. Veijalainen. Distributed PIN verification scheme for improving security of mobile devices. In Mobile Networks and Applications, 8(2), pages 159--175, 2003.
[37]
K.P. Tang, P. Keyani, J. Fogarty, and J.I. Hong. Putting people in their place: an anonymous and privacy-sensitive approach to collecting sensed data in location-based applications. In Proceedings of the conference on Human Factors in computing systems, pages 93--102, 2006.
[38]
M. Voorneveld, P. Borm, F. Van Megen, S. Tijs, and G. Facchini. Congestion games and potentials reconsidered. International Game Theory Review, pages 283--299, 1999.

Cited By

View all
  • (2017)Viewing the ViewersProceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing10.1145/2998181.2998288(555-566)Online publication date: 25-Feb-2017
  • (2015)A Usable and Secure Crime Reporting System for Technology Resource Constrained ContextProceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops10.1109/WAINA.2015.97(424-429)Online publication date: 24-Mar-2015
  • (2011)A privacy mechanism for mobile commerceProceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks10.1109/WoWMoM.2011.5986164(1-6)Online publication date: 20-Jun-2011
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '08: Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
October 2008
430 pages
ISBN:9781605582351
DOI:10.1145/1454503
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 October 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. community based social networking
  2. game theory
  3. location sharing
  4. mobile safety application
  5. pricacy

Qualifiers

  • Research-article

Conference

MSWiM '08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Viewing the ViewersProceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing10.1145/2998181.2998288(555-566)Online publication date: 25-Feb-2017
  • (2015)A Usable and Secure Crime Reporting System for Technology Resource Constrained ContextProceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops10.1109/WAINA.2015.97(424-429)Online publication date: 24-Mar-2015
  • (2011)A privacy mechanism for mobile commerceProceedings of the 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks10.1109/WoWMoM.2011.5986164(1-6)Online publication date: 20-Jun-2011
  • (2011)An Approach to Community-Oriented Email Privacy2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing10.1109/PASSAT/SocialCom.2011.96(966-973)Online publication date: Oct-2011
  • (2010)Social Emergency Alert Service - A Location-Based Privacy-Aware Personal Safety ServiceProceedings of the 2010 Fourth International Conference on Next Generation Mobile Applications, Services and Technologies10.1109/NGMAST.2010.27(84-89)Online publication date: 27-Jul-2010
  • (2009)Spontaneous privacy-aware location sharing2009 Joint Conferences on Pervasive Computing (JCPC)10.1109/JCPC.2009.5420154(395-398)Online publication date: Dec-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media