Abstract
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizing agents has received much attention lately. Privacy concerns are often modeled by altering the utility functions of agents to consider also their privacy loss [4, 14, 20, 28]. Such privacy-aware agents prefer to take a randomized strategy even in very simple games in which non-privacy-aware agents play pure strategies. In some cases, the behavior of privacy-aware agents follows the framework of Randomized Response, a well-known mechanism that preserves differential privacy.
Our work is aimed at better understanding the behavior of agents in settings where their privacy concerns are explicitly given. We consider a toy setting where agent A, in an attempt to discover the secret type of agent B, offers B a gift that one type of B agent likes and the other type dislikes. As opposed to previous works, B’s incentive to keep her type a secret isn’t the result of “hardwiring” B’s utility function to consider privacy, but rather takes the form of a payment between B and A. We investigate three different types of payment functions and analyze B’s behavior in each of the resulting games. As we show, under some payments, B’s behavior is very different than the behavior of agents with hardwired privacy concerns and might even be deterministic. Under a different payment, we show that B’s BNE strategy does fall into the framework of Randomized Response.
- Raef Bassily, Adam Groce, Jonathan Katz, and Adam Smith. 2013. Coupled-worlds privacy: Exploiting adversarial uncertainty in statistical data privacy. In Foundations of Computer Science (FOCS'13)Google Scholar
- Dirk Bergemann, Benjamin Brooks, and Stephen Morris. 2013. The Limits of Price Discrimination. Cowles Foundation Discussion Papers 1896. Cowles Foundation for Research in Economics, Yale University. Retrieved from http://ideas.repec.org/p/cwl/cwldpp/1896.html.Google Scholar
- Giacomo Calzolari and Alessandro Pavan. 2006. On the optimality of privacy in sequential contracting. Journal of Economic Theory 130, 1 (2006), 168--204.Google ScholarCross Ref
- Yiling Chen, Stephen Chong, Ian A. Kash, Tal Moran, and Salil P. Vadhan. 2013. Truthful mechanisms for agents that value privacy. In EC.Google Scholar
- Yiling Chen, Nikhil R. Devanur, David M. Pennock, and Jennifer Wortman Vaughan. 2014. Removing arbitrage from wagering mechanisms. In EC.Google Scholar
- Vincent Conitzer, Curtis R. Taylor, and Liad Wagman. 2012. Hide and seek: Costly consumer privacy in a market with repeat purchases. Marketing Science 31, 2 (2012), 277--292.Google ScholarDigital Library
- Cynthia Dwork. 2006. Differential privacy. In ICALP.Google Scholar
- Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, and Moni Naor. 2006. Our data, ourselves: Privacy via distributed noise generation. In EUROCRYPT.Google Scholar
- Cynthia Dwork, Frank Mcsherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In TCC.Google Scholar
- Cynthia Dwork and Adam Smith. 2010. Differential privacy for statistics: What we know and what we want to learn. Journal of Privacy and Confidentiality 1, 2 (2010), 2.Google ScholarCross Ref
- Lisa Fleischer and Yu-Han Lyu. 2012. Approximately optimal auctions for selling privacy when costs are correlated with data. In EC.Google Scholar
- D. Fudenberg, J. Tirole, J. A. Tirole, and MIT Press. 1991. Game Theory. MIT Press.Google Scholar
- Arpita Ghosh, Katrina Ligett, Aaron Roth, and Grant Schoenebeck. 2014. Buying private data without verification. In EC.Google Scholar
- Arpita Ghosh and Aaron Roth. 2011. Selling privacy at auction. In EC.Google Scholar
- Tilmann Gneiting and Adrian E. Raftery. 2007. Strictly proper scoring rules, prediction, and estimation. Journal of the American Statistical Association 102, 477 (2007), 359--378.Google ScholarCross Ref
- Ronen Gradwohl and Rann Smorodinsky. 2014. Subjective perception games and privacy. CoRR abs/1409.1487 (2014). http://arxiv.org/abs/1409.1487.Google Scholar
- Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith. 2008. What can we learn privately? In FOCS.Google Scholar
- Andreu Mas-Colell, Michael D. Whinston, and Jerry R. Green. 1995. Microeconomic Theory. Oxford University Press.Google Scholar
- Frank McSherry and Kunal Talwar. 2007. Mechanism design via differential privacy. In FOCS. 94--103.Google Scholar
- Kobbi Nissim, Claudio Orlandi, and Rann Smorodinsky. 2012. Privacy-aware mechanism design. In EC.Google Scholar
- Kobbi Nissim, Rann Smorodinsky, and Moshe Tennenholtz. 2012. Approximately optimal mechanism design via differential privacy. In ITCS.Google Scholar
- Kobbi Nissim, Salil P. Vadhan, and David Xiao. 2014. Redrawing the boundaries on purchasing data from privacy-sensitive individuals. In ITCS.Google Scholar
- Aaron Roth and Grant Schoenebeck. 2012. Conducting truthful surveys, cheaply. In EC.Google Scholar
- Leonard J. Savage. 1971. Elicitation of personal probabilities and expectations. Journal of the American Statistical Association 66, 336 (1971), 783--801.Google ScholarCross Ref
- Michael Spence. 1973. Job market signalling. Quarterly Journal of Economics 87, 3 (August 1973), 355--374.Google ScholarCross Ref
- Stanley L. Warner. 1965. Randomized response: A survey technique for eliminating evasive answer bias. Journal of the American Statistical Association 60, 309 (March 1965), 63--69.Google ScholarCross Ref
- R. L. Winkler. 1996. Scoring rules and the evaluation of probabilities. Test 5, 1 (1996), 1--60.Google ScholarCross Ref
- David Xiao. 2013. Is privacy compatible with truthfulness? In ITCS. 67--86.Google Scholar
Index Terms
- Privacy Games
Recommendations
A privacy framework: indistinguishable privacy
EDBT '13: Proceedings of the Joint EDBT/ICDT 2013 WorkshopsIn this paper we illustrate a privacy framework named Indistinguishable Privacy. Indistinguishable privacy could be deemed as the formalization of the existing privacy definitions in privacy preserving data publishing as well as secure multi-party ...
Privacy-aware mechanism design
EC '12: Proceedings of the 13th ACM Conference on Electronic CommerceMechanism design deals with distributed algorithms that are executed with self-interested agents. The designer, whose objective is to optimize some function of the agents private types, needs to construct a computation that takes into account agent ...
An equilibrium analysis of trading across multiple double auction marketplaces using fictitious play
We investigate traders' market selection and bidding strategies in multiple double auctions.We model the setting as a Bayesian game with continuous private values.We consider different trading environments with independent, substitutable and ...
Comments