Abstract | ||
---|---|---|
Location Based Service (LBS), although it greatly benefits the daily life of mobile device users, has introduced significant threats to privacy. In an LBS system, even under the protection of pseudonyms, users may become victims of inference attacks, where an adversary reveals a user's real identity and complete moving trajectory with the aid of side information, e.g., accidental identity disclosure through personal encounters. To enhance privacy protection for LBS users, a common approach is to include extra fake location information associated with different pseudonyms, known as dummy users, in normal location reports. Due to the high cost of dummy generation using resource constrained mobile devices, self-interested users may free-ride on others' efforts. The presence of such selfish behaviors may have an adverse effect on privacy protection. In this paper, we study the behaviors of self-interested users in the LBS system from a game-theoretic perspective. We model the distributed dummy user generation as Bayesian games in both static and timing-aware contexts, and analyze the existence and properties of the Bayesian Nash Equilibria for both models. Based on the analysis, we propose a strategy selection algorithm to help users achieve optimized payoffs. Leveraging a beta distribution generalized from real-world location privacy data traces, we perform simulations to assess the privacy protection effectiveness of our approach. The simulation results validate our theoretical analysis for the dummy user generation game models. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1109/INFCOM.2013.6567110 | INFOCOM |
Keywords | Field | DocType |
data privacy,k-anonymity,bayes methods,selfish behavior,self-interested user,location report,privacy protection effectiveness,moving trajectory,game theory,timing aware context,bayesian nash equilibria,static aware context,extra fake location information,dummy user,bayesian game,location privacy data trace,location based service,mobile computing,games,privacy,correlation,servers,trajectory | Mobile computing,Computer science,Computer security,k-anonymity,Computer network,Location-based service,Mobile device,Game theory,Nash equilibrium,Information privacy,Privacy software | Conference |
ISSN | ISBN | Citations |
0743-166X | 978-1-4673-5944-3 | 42 |
PageRank | References | Authors |
1.26 | 23 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Xinxin Liu | 1 | 151 | 8.79 |
Kaikai Liu | 2 | 190 | 20.37 |
Linke Guo | 3 | 244 | 20.77 |
Xiaolin Li | 4 | 405 | 37.36 |
Yuguang Fang | 5 | 6982 | 476.76 |