Extensive Form Game Analysis Based on Context Privacy Preservation for Smart Phone Applications
详细信息    查看全文
  • 关键词:Context ; aware ; Privacy protection ; Mobile application ; Game theory
  • 刊名:Lecture Notes in Computer Science
  • 出版年:2016
  • 出版时间:2016
  • 年:2016
  • 卷:9798
  • 期:1
  • 页码:389-400
  • 全文大小:698 KB
  • 参考文献:1.Duan, Z., Yan, M., Cai, Z., Wang, X., Han, M., Li, Y.: Truthful incentive mechanisms for social cost minimization in mobile crowdsourcing systems. Sensors 16(4), 481 (2016)CrossRef
    2.Götz, M., Nath, S., Gehrke, J.: MaskIt: privately releasing user context streams for personalized mobile applications. In: Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, pp. 289–300. ACM (2012)
    3.Groat, M.M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: INFOCOM, 2011 Proceedings IEEE, pp. 2024–2032. IEEE (2011)
    4.Hu, W., Chunqiang, L., Huang, S.: Message in a concealed bottle: achieving query content privacy with accurate location-based services. In: Privacy Enhancing Technologies Symposium (2016, submitted)
    5.Narayanan, A., Thiagarajan, N., Lakhani, M., Hamburg, M., Boneh, D.: Location privacy via private proximity testing. In: NDSS (2011)
    6.Shin, M., Cornelius, C., Peebles, D., Kapadia, A., Kotz, D., Triandopoulos, N.: Anonysense: a system for anonymous opportunistic sensing. Pervasive Mob. Comput. 7(1), 16–30 (2011)CrossRef
    7.Vu, K., Zheng, R., Gao, L.: Efficient algorithms for k-anonymous location privacy in participatory sensing. In: INFOCOM, 2012 Proceedings IEEE, pp. 2399–2407. IEEE (2012)
    8.Wang, W., Zhang, Q.: A stochastic game for privacy preserving context sensing on mobile phone. In: INFOCOM, 2014 Proceedings IEEE, pp. 2328–2336. IEEE (2014)
    9.Wang, Y., Cai, Z., Yin, G., Gao, Y., Tong, X., Wu, G.: An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput. Netw. 102, 157–171 (2016)CrossRef
    10.Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Trans. Mob. Comput. 5(10), 1417–1431 (2006)CrossRef
    11.Yang, P., Cao, Z., Dong, X., Zia, T.A.: An efficient privacy preserving data aggregation scheme with constant communication overheads for wireless sensor networks. Commun. Lett. IEEE 15(11), 1205–1207 (2011)CrossRef
    12.Zhang, L., Cai, Z., Wang, X.: Fakemask: a novel privacy preserving approach for smartphones
  • 作者单位:Luyun Li (16)
    Shengling Wang (16)
    Junqi Guo (16)
    Rongfang Bie (16)
    Kai Lin (17)

    16. College of Information Science and Technology, Beijing Normal University, Beijing, China
    17. Telecommunications Engineering with Management, International School, Beijing University of Posts and Telecommunications, Beijing, China
  • 丛书名:Wireless Algorithms, Systems, and Applications
  • ISBN:978-3-319-42836-9
  • 刊物类别:Computer Science
  • 刊物主题:Artificial Intelligence and Robotics
    Computer Communication Networks
    Software Engineering
    Data Encryption
    Database Management
    Computation by Abstract Devices
    Algorithm Analysis and Problem Complexity
  • 出版者:Springer Berlin / Heidelberg
  • ISSN:1611-3349
  • 卷排序:9798
文摘
The sensing capabilities of the smart phones gave birth to context-aware applications, which can provide personalized services based on users’ contexts. Since context-aware applications may sell contexts to some malicious third-parties, the exposure of contexts will handicap the development of context-aware applications in large scale. Nevertheless, it is challenging to solve the context privacy issue, because the users of the context-aware applications should trade off between service quality and privacy exposure. Nowadays, most privacy protection techniques for mobile applications neglect the context preservation. Meanwhile, limited work on context privacy doesn’t consider the applications’ strategies, which are key factors on user’s context privacy preservation. In this paper, we make a tradeoff analysis on behaviours of the user, the application and the adversary, and then we use extensive form game to formulate the decision-marking process of these three parties. After constructing payoff functions for them, we solve and analyse their Nash equilibriums. Our study shows that the key of context privacy preservation is to establish a sound reputation mechanism for context-aware applications, through which the issue of context privacy can be eliminated utterly. As a consequence, a trust between users and mobile applications can be built.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700