Advertisement

Collaborative Location Privacy with Rational Users

  • Francisco Santos
  • Mathias Humbert
  • Reza Shokri
  • Jean-Pierre Hubaux
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7037)

Abstract

Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with their current coordinates. However, LBS providers collect a significant amount of data from mobile users and could be tempted to misuse it, by compromising a customer’s location privacy (her ability to control the information about her past and present location). Many solutions to mitigate this privacy threat focus on changing both the architecture of location-based systems and the business models of LBS providers. MobiCrowd does not introduce changes to the existing business practices of LBS providers, rather it requires mobile devices to communicate wirelessly in a peer-to-peer fashion. To lessen the privacy loss, users seeking geographic information try to obtain this data by querying neighboring nodes, instead of connecting to the LBS. However, such a solution will only function if users are willing to share regional data obtained from the LBS provider. We model this collaborative location-data sharing problem with rational agents following threshold strategies. Initially, we study agent cooperation by using pure game theory and then by combining game theory with an epidemic model that is enhanced to support threshold strategies to address a complex multi-agent scenario. From our game-theoretic analysis, we derive cooperative and non-cooperative Nash equilibria and the optimal threshold that maximizes agents’ expected utility.

Keywords

Nash Equilibrium Regional Data Rational User Epidemic Model Location Privacy 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Alpcan, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press (2010)Google Scholar
  2. 2.
    Başar, T., Olsder, G.: Dynamic noncooperative game theory. Society for Industrial Mathematics (1999)Google Scholar
  3. 3.
    Bauch, C., Earn, D.: Vaccination and the theory of games. Proceedings of the National Academy of Sciences of the United States of America 101(36), 13391 (2004)CrossRefzbMATHMathSciNetGoogle Scholar
  4. 4.
    Buttyan, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. Cambridge University Press, New York (2007)CrossRefGoogle Scholar
  5. 5.
    Dhar, S., Varshney, U.: Challenges and business models for mobile location-based services and advertising. Commun. ACM 54, 121–128 (2011), http://doi.acm.org/10.1145/1941487.1941515 CrossRefGoogle Scholar
  6. 6.
    Earn, D.: A Light Introduction to Modelling Recurrent Epidemics. In: Brauer, F., van den Driessche, P., Wu, J. (eds.) Mathematical Epidemiology. Lecture Notes in Mathematics, vol. 1945, pp. 3–17. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  7. 7.
    Felegyhazi, M., Hubaux, J., Buttyan, L.: Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Computing 5(5), 463–476 (2006)CrossRefGoogle Scholar
  8. 8.
    Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: On Non-cooperative Location Privacy: A Game-theoretic Analysis. In: ACM Conference on Computer and Communications Security (CCS) (2009), http://www.sigsac.org/ccs/CCS2009/
  9. 9.
    Humbert, M., Manshaei, M.H., Freudiger, J., Hubaux, J.-P.: Tracking Games in Mobile Networks. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 38–57. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  10. 10.
    Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391–399 (2009)CrossRefGoogle Scholar
  11. 11.
    Manshaei, M., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.P.: Game Theory Meets Network Security and Privacy. Tech. rep., École Polytechnique Fédérale de Lausanne, Lausanne (2010)Google Scholar
  12. 12.
    Olumofin, F., Tysowski, P.K., Goldberg, I., Hengartner, U.: Achieving Efficient Query Privacy for Location Based Services. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 93–110. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  13. 13.
    Osborne, M., Rubinstein, A.: A Course in Game Theory. The MIT press (1994)Google Scholar
  14. 14.
    Shokri, R., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J.P.: Collaborative Location Privacy. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, MASS (2011)Google Scholar
  15. 15.
    Theodorakopoulos, G., Le Boudec, J.Y., Baras, J.S.: Selfish Response to Epidemic Propagation. IEEE Transactions on Automatic Control (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Francisco Santos
    • 1
  • Mathias Humbert
    • 1
  • Reza Shokri
    • 1
  • Jean-Pierre Hubaux
    • 1
  1. 1.School of Computer and Communication SciencesEPFLSwitzerland

Personalised recommendations