Cooperative privacy game: a novel strategy for preserving privacy in data publishing

Achieving data privacy before publishing has been becoming an extreme concern of researchers, individuals and service providers. A novel methodology, Cooperative Privacy Game (CoPG), has been proposed to achieve data privacy in which Cooperative Game Theory is used to achieve the privacy and is named as Cooperative Privacy (CoP). The core idea of CoP is to play the best strategy for a player to preserve his privacy by himself which in turn contributes to preserving other players privacy. CoP considers each tuple as a player and tuples form coalitions as described in the procedure. The main objective of the CoP is to obtain individuals (player) privacy as a goal that is rationally interested in other individuals’ (players) privacy. CoP is formally defined in terms of Nash equilibria, i.e., all the players are in their best coalition, to achieve k-anonymity. The cooperative values of the each tuple are measured using the characteristic function of the CoPG to identify the coalitions. As the underlying game is convex; the algorithm is efficient and yields high quality coalition formation with respect to intensity and disperse. The efficiency of anonymization process is calculated using information loss metric. The variations of the information loss with the parameters $$\alpha$$α (weight factor of nearness) and $$\beta$$β (multiplicity) are analyzed and the obtained results are discussed.

[1]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[2]  David J. DeWitt,et al.  Mondrian Multidimensional K-Anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[3]  Catherine Blake,et al.  UCI Repository of machine learning databases , 1998 .

[4]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[5]  Anne V. D. M. Kayem,et al.  K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.

[6]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  Ping Wang,et al.  Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment , 2015, IEEE Transactions on Dependable and Secure Computing.

[8]  Philip D. Straffin,et al.  Game theory and strategy , 1993 .

[9]  V. Valli Kumari,et al.  A Coalitional Game Theoretic Mechanism for Privacy Preserving Publishing Based on k-Anonymity , 2012 .

[10]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[11]  N. Ranganathan,et al.  A Game Theoretic Approach for Simultaneous Compaction and Equipartitioning of Spatial Data Sets , 2010, IEEE Transactions on Knowledge and Data Engineering.

[12]  Sören Preibusch,et al.  Implementing Privacy Negotiations in E-Commerce , 2006, APWeb.

[13]  L. Shapley Cores of convex games , 1971 .

[14]  Leslie Burnett,et al.  The "GeneTrustee": a universal identification system that ensures privacy and confidentiality for human genetic databases. , 2003, Journal of law and medicine.

[15]  Ping Wang,et al.  Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity , 2015, Inf. Sci..

[16]  Marcello Pelillo,et al.  A Game-Theoretic Approach to Hypergraph Clustering , 2009, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[17]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[18]  Ashwin Machanavajjhala,et al.  Personalized Social Recommendations - Accurate or Private? , 2011, Proc. VLDB Endow..

[19]  Bruce Bueno de Mesquita,et al.  An Introduction to Game Theory , 2014 .

[20]  Philip S. Yu,et al.  Privacy-preserving data publishing: A survey of recent developments , 2010, CSUR.

[21]  Adam Brandenburger,et al.  Value-based Business Strategy , 2005 .

[22]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[23]  Valli Kumari Vatsavayi,et al.  Privacy preserving data publishing: a coalitional game theory perspective , 2014, Int. J. Comput. Intell. Stud..

[24]  Rainer Böhme,et al.  On the Viability of Privacy-Enhancing Technologies in a Self-Regulated Business-to-Consumer Market: Will Privacy Remain a Luxury Good? , 2007, WEIS.

[25]  Y. Narahari,et al.  Novel Biobjective Clustering (BiGC) Based on Cooperative Game Theory , 2013, IEEE Transactions on Knowledge and Data Engineering.

[26]  Roberto J. Bayardo,et al.  Data privacy through optimal k-anonymization , 2005, 21st International Conference on Data Engineering (ICDE'05).

[27]  Avanidhar Subrahmanyam,et al.  The Value of Private Information , 2005 .

[28]  Charu C. Aggarwal,et al.  On k-Anonymity and the Curse of Dimensionality , 2005, VLDB.

[29]  N. Ranganathan,et al.  A microeconomic approach to multi-objective spatial clustering , 2008, 2008 19th International Conference on Pattern Recognition.

[30]  Elisa Bertino,et al.  Efficient k -Anonymization Using Clustering Techniques , 2007, DASFAA.

[31]  Youngsub Chun,et al.  On the Coincidence of the Shapley Value and the Nucleolus in Queueing Problems , 2007 .

[32]  Jin Wang,et al.  SCAR: A Coding-Aware Routing Protocol with Self-Recommendation in Static Wireless Ad Hoc Networks , 2014, J. Comput. Networks Commun..

[33]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[34]  Josep Domingo-Ferrer,et al.  Coprivacy: an introduction to the theory and applications of co-operative privacy , 2011 .

[35]  Raymond Chi-Wing Wong,et al.  (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.

[36]  Pierangela Samarati,et al.  Generalizing Data to Provide Anonymity when Disclosing Information , 1998, PODS 1998.

[37]  Ping Wang,et al.  On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions , 2014, Comput. Networks.

[38]  Horace E. Anderson,et al.  The Privacy Gambit: Toward a Game Theoretic Approach to International Data Protection , 2009 .

[39]  C. Papadimitriou,et al.  On the value of private information , 2001 .

[40]  Tim Roughgarden,et al.  Algorithmic Game Theory , 2007 .

[41]  Josep Domingo-Ferrer,et al.  Coprivacy: Towards a Theory of Sustainable Privacy , 2010, Privacy in Statistical Databases.

[42]  Muhammad Khurram Khan,et al.  An enhanced privacy preserving remote user authentication scheme with provable security , 2015, Secur. Commun. Networks.