Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps

Free mobile applications of cloud computing offer a range of diverse services (e.g. gaming, storage etc.) usally in return for delivering personalized advertising to their consenting end-users. In order to do so they may retain a range of personal information such as location and personal preferences. Thus, privacy-related interactions between service providers and end users are important to be studied as personal data are valuable in a subscription-based cloud system. In this paper, game theory is used as a tool to identify and analyze such interactions in order to understand stakeholder choices, as well as how to improve the quality of the service offered in a cloud computing setting.

[1]  Kai Rannenberg,et al.  Privacy and Identity Management for Life , 2011, Privacy and Identity Management for Life.

[2]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[3]  K. Hausken Probabilistic Risk Analysis and Game Theory , 2002, Risk analysis : an official publication of the Society for Risk Analysis.

[4]  Bart De Decker,et al.  Communications and Multimedia Security , 2013, Lecture Notes in Computer Science.

[5]  Spyros Kokolakis,et al.  An Analysis of Privacy-Related Strategic Choices of Buyers and Sellers in E-commerce Transactions , 2012, 2012 16th Panhellenic Conference on Informatics.

[6]  Lisa Rajbhandari,et al.  Mapping between Classical Risk Management and Game Theoretical Approaches , 2011, Communications and Multimedia Security.

[7]  Rajkumar Buyya,et al.  CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services , 2009, ArXiv.

[8]  Siani Pearson,et al.  Taking account of privacy when designing cloud computing services , 2009, 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing.

[9]  Lisa Rajbhandari,et al.  Using Game Theory to Analyze Risk to Privacy: An Initial Insight , 2010, PrimeLife.

[10]  T. S. Raghu,et al.  Privacy and Security Practices in the Arena of Cloud Computing - A Research in Progress , 2010, AMCIS.

[11]  Helmut Krcmar,et al.  Competing in the Clouds: A Strategic Challenge for ITSP Ltd , 2010, Commun. Assoc. Inf. Syst..