The Functionality-Security-Privacy Game

Privacy preservation in the information society is in many respects parallel to environment preservation in the physical world. In this way, "green ICT services" are those achieving functionality and security with minimum invasion of the privacy of individuals, where such an invasion can be regarded as a kind of pollution as harmful in the long run to their moral welfare as physical pollution is to their physical welfare. Depending on the type of service, individuals can be users, data owners or respondents having supplied data. We show that the conflict between functionality, security and privacy can be viewed as a game between several players whose interests differ. If the game is properly formulated, its equilibria can lead to protocols conciliating the functionality, security and privacy interests of all players.

[1]  Josep Domingo-Ferrer,et al.  A Survey of Inference Control Methods for Privacy-Preserving Data Mining , 2008, Privacy-Preserving Data Mining.

[2]  Susan B. Barnes,et al.  A privacy paradox: Social networking in the United States , 2006, First Monday.

[3]  R. Canetti,et al.  Cryptography and Game Theory , 2009 .

[4]  V. Vazirani,et al.  Algorithmic Game Theory: Basic Solution Concepts and Computational Issues , 2007 .

[5]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[6]  Josep Domingo-Ferrer,et al.  User-private information retrieval based on a peer-to-peer community , 2009, Data Knowl. Eng..

[7]  Josep Domingo-Ferrer,et al.  Privacy homomorphisms for social networks with private relationships , 2008, Comput. Networks.

[8]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[9]  Josep Domingo-Ferrer,et al.  Trustworthy Privacy-Preserving Car-Generated Announcements in Vehicular Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.

[10]  Maxim Raya,et al.  Efficient secure aggregation in VANETs , 2006, VANET '06.

[11]  John Blau Car talk - [update] , 2008, IEEE Spectrum.

[12]  Josep Domingo-Ferrer,et al.  H(k)-private Information Retrieval from Privacy-uncooperative Queryable Databases.">h(k)-private Information Retrieval from Privacy-uncooperative Queryable Databases , 2009, Online Inf. Rev..

[13]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[14]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[15]  Josep Domingo-Ferrer,et al.  A Three-Dimensional Conceptual Framework for Database Privacy , 2007, Secure Data Management.

[16]  T. Rabin,et al.  Algorithmic Game Theory: Cryptography and Game Theory , 2007 .

[17]  Barbara Carminati,et al.  Private Relationships in Social Networks , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.

[18]  Yehuda Lindell,et al.  Privacy Preserving Data Mining , 2002, Journal of Cryptology.

[19]  Ian R. Kerr,et al.  Lessons from the Identity Trail: Anonymity, Privacy and Identity in a Networked Society , 2009 .

[20]  E. Rowland Theory of Games and Economic Behavior , 1946, Nature.

[21]  Philip S. Yu,et al.  Privacy-Preserving Data Mining - Models and Algorithms , 2008, Advances in Database Systems.

[22]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.