Context Sensing System Analysis for Privacy Preservation Based on Game Theory †

In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user’s contexts, based on which it provides personalized services. However, the application may sell the user’s contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one.

[1]  Qian Zhang,et al.  A stochastic game for privacy preserving context sensing on mobile phone , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[2]  Yingshu Li,et al.  Truthful Incentive Mechanisms for Social Cost Minimization in Mobile Crowdsourcing Systems , 2016, Sensors.

[3]  Xiaojun Shan,et al.  Subsidizing to disrupt a terrorism supply chain—a four-player game , 2014, J. Oper. Res. Soc..

[4]  Rachel A. Davidson,et al.  Modeling Insurer‐Homeowner Interactions in Managing Natural Disaster Risk , 2014, Risk analysis : an official publication of the Society for Risk Analysis.

[5]  Dan Boneh,et al.  Location Privacy via Private Proximity Testing , 2011, NDSS.

[6]  Wenbo He,et al.  KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.

[7]  Dirk Westhoff,et al.  Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.

[8]  Minho Shin,et al.  AnonySense: A system for anonymous opportunistic sensing , 2011, Pervasive Mob. Comput..

[9]  Rachel A. Davidson,et al.  Modeling the integrated roles of insurance and retrofit in managing natural disaster risk: a multi-stakeholder perspective , 2014, Natural Hazards.

[10]  Xiaolei Dong,et al.  An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks , 2011, IEEE Communications Letters.

[11]  Zhipeng Cai,et al.  FakeMask: A Novel Privacy Preserving Approach for Smartphones , 2016, IEEE Transactions on Network and Service Management.

[12]  Yang Gao,et al.  An incentive mechanism with privacy protection in mobile crowdsourcing systems , 2016, Comput. Networks.

[13]  Suman Nath,et al.  MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.

[14]  Rong Zheng,et al.  Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[15]  Vicki M. Bier,et al.  Balancing Terrorism and Natural Disasters - Defensive Strategy with Endogenous Attacker Effort , 2007, Oper. Res..