Title
A game-theoretic approach for achieving k-anonymity in Location Based Services
Abstract
Location Based Service (LBS), although it greatly benefits the daily life of mobile device users, has introduced significant threats to privacy. In an LBS system, even under the protection of pseudonyms, users may become victims of inference attacks, where an adversary reveals a user's real identity and complete moving trajectory with the aid of side information, e.g., accidental identity disclosure through personal encounters. To enhance privacy protection for LBS users, a common approach is to include extra fake location information associated with different pseudonyms, known as dummy users, in normal location reports. Due to the high cost of dummy generation using resource constrained mobile devices, self-interested users may free-ride on others' efforts. The presence of such selfish behaviors may have an adverse effect on privacy protection. In this paper, we study the behaviors of self-interested users in the LBS system from a game-theoretic perspective. We model the distributed dummy user generation as Bayesian games in both static and timing-aware contexts, and analyze the existence and properties of the Bayesian Nash Equilibria for both models. Based on the analysis, we propose a strategy selection algorithm to help users achieve optimized payoffs. Leveraging a beta distribution generalized from real-world location privacy data traces, we perform simulations to assess the privacy protection effectiveness of our approach. The simulation results validate our theoretical analysis for the dummy user generation game models.
Year
DOI
Venue
2013
10.1109/INFCOM.2013.6567110
INFOCOM
Keywords
Field
DocType
data privacy,k-anonymity,bayes methods,selfish behavior,self-interested user,location report,privacy protection effectiveness,moving trajectory,game theory,timing aware context,bayesian nash equilibria,static aware context,extra fake location information,dummy user,bayesian game,location privacy data trace,location based service,mobile computing,games,privacy,correlation,servers,trajectory
Mobile computing,Computer science,Computer security,k-anonymity,Computer network,Location-based service,Mobile device,Game theory,Nash equilibrium,Information privacy,Privacy software
Conference
ISSN
ISBN
Citations 
0743-166X
978-1-4673-5944-3
42
PageRank 
References 
Authors
1.26
23
5
Name
Order
Citations
PageRank
Xinxin Liu11518.79
Kaikai Liu219020.37
Linke Guo324420.77
Xiaolin Li440537.36
Yuguang Fang56982476.76