Investigating the Value of Privacy within the Internet of Things

Many companies within the Internet of Things (IoT) sector rely on the personal data of users to deliver and monetize their services, creating a high demand for personal information. A user can be seen as making a series of transactions, each involving the exchange of personal data for a service. In this paper, we argue that privacy can be described quantitatively, using the game- theoretic concept of value of information (VoI), enabling us to assess whether each exchange is an advantageous one for the user. We introduce PrivacyGate, an extension to the Android operating system built for the purpose of studying privacy of IoT transactions. An example study, and its initial results, are provided to illustrate its capabilities.

[1]  Damla Turgut,et al.  A pragmatic value-of-information approach for intruder tracking sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[2]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[3]  G. Loewenstein,et al.  What Is Privacy Worth? , 2013, The Journal of Legal Studies.

[4]  Oliver Günther,et al.  Investigating the Value of Privacy in Online Social Networks: Conjoint Analysis , 2009, ICIS.

[5]  Tansu Alpcan,et al.  Trading privacy with incentives in mobile commerce: A game theoretic approach , 2013, Pervasive Mob. Comput..

[6]  Damla Turgut,et al.  Value of information based scheduling of cloud computing resources , 2017, Future Gener. Comput. Syst..

[7]  Yu Pu,et al.  Using Conjoint Analysis to Investigate the Value of Interdependent Privacy in Social App Adoption Scenarios , 2015, ICIS.

[8]  Mani B. Srivastava,et al.  Building principles for a quality of information specification for sensor information , 2009, 2009 12th International Conference on Information Fusion.

[9]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[10]  Kai Lung Hui,et al.  Online Information Privacy: Measuring the Cost-Benefit Trade-Off , 2002, ICIS.

[11]  Emmanouil A. Panaousis,et al.  Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[12]  Damla Turgut,et al.  Scheduling data transmissions of underwater sensor nodes for maximizing value of information , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).

[13]  Damla Turgut,et al.  Value of Information and Cost of Privacy in the Internet of Things , 2017, IEEE Communications Magazine.

[14]  George Danezis,et al.  The Value of Location Information , 2006, Security Protocols Workshop.

[15]  Christine Bauer,et al.  Psychology of Ownership and Asset Defense: Why People Value Their Personal Information Beyond Privacy , 2012, ICIS.

[16]  Jessica Staddon,et al.  Indirect content privacy surveys: measuring privacy without asking about it , 2011, SOUPS.

[17]  David J. Danelski,et al.  Privacy and Freedom , 1968 .

[18]  Laura A. Levit,et al.  Beyond the HIPAA Privacy Rule: Enhancing Privacy, Improving Health Through Research. Washington, DC: National Academies Press , 2009 .

[19]  Damla Turgut,et al.  IVE: Improving the value of information in energy-constrained intruder tracking sensor networks , 2013, 2013 IEEE International Conference on Communications (ICC).