A Hybrid Privacy Protection Scheme in Cyber-Physical Social Networks

The rapid proliferation of smart mobile devices has significantly enhanced the popularization of the cyber-physical social network, where users actively publish data with sensitive information. Adversaries can easily obtain these data and launch continuous attacks to breach privacy. However, existing works only focus on either location privacy or identity privacy with a static adversary. This results in privacy leakage and possible further damage. Motivated by this, we propose a hybrid privacy-preserving scheme, which considers both location and identity privacy against a dynamic adversary. We study the privacy protection problem as the tradeoff between the users aiming at maximizing data utility with high-level privacy protection while adversaries possessing the opposite goal. We first establish a game-based Markov decision process model, in which the user and the adversary are regarded as two players in a dynamic multistage zero-sum game. To acquire the best strategy for users, we employ a modified state-action-reward-state-action reinforcement learning algorithm. Iteration times decrease because of cardinality reduction from $n$ to 2, which accelerates the convergence process. Our extensive experiments on real-world data sets demonstrate the efficiency and feasibility of the propose method.

[1]  Takuya Maekawa,et al.  How Well Can a User’s Location Privacy Preferences be Determined Without Using GPS Location Data? , 2017, IEEE Transactions on Emerging Topics in Computing.

[2]  Jiguo Yu,et al.  Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems , 2017, IEEE Internet of Things Journal.

[3]  David C. Parkes,et al.  On non-cooperative location privacy: a game-theoretic analysis , 2009, CCS.

[4]  Tianqing Zhu,et al.  Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.

[5]  Ulrik Brandes,et al.  Investigating Link Inference in Partially Observable Networks: Friendship Ties and Interaction , 2016, IEEE Transactions on Computational Social Systems.

[6]  Sanming Zhou,et al.  Networking for Big Data: A Survey , 2017, IEEE Communications Surveys & Tutorials.

[7]  Qian Zhang,et al.  Privacy Preservation for Context Sensing on Smartphone , 2016, IEEE/ACM Transactions on Networking.

[8]  Cynthia Dwork,et al.  Differential Privacy , 2006, ICALP.

[9]  Dr B Santhosh Kumar Santhosh Balan,et al.  Closeness : A New Privacy Measure for Data Publishing , 2022 .

[10]  Yan Zheng,et al.  Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.

[11]  Xiaohui Liang,et al.  PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks , 2015, IEEE Transactions on Computational Social Systems.

[12]  George J. Pappas,et al.  Diffusing private data over networks , 2015, 2016 American Control Conference (ACC).

[13]  Shui Yu,et al.  Big data set privacy preserving through sensitive attribute-based grouping , 2017, 2017 IEEE International Conference on Communications (ICC).

[14]  Ting Yu,et al.  Mining frequent graph patterns with differential privacy , 2013, KDD.

[15]  Yuqing Mao,et al.  Web of Credit: Adaptive Personalized Trust Network Inference From Online Rating Data , 2016, IEEE Transactions on Computational Social Systems.

[16]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[17]  Andrew W. Moore,et al.  Reinforcement Learning: A Survey , 1996, J. Artif. Intell. Res..

[18]  Wanlei Zhou,et al.  Improving Data Utility through Game Theory in Personalized Differential Privacy , 2018, 2018 IEEE International Conference on Communications (ICC).

[19]  Hwee Pink Tan,et al.  Markov Decision Processes With Applications in Wireless Sensor Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[20]  Xu Chen,et al.  When Social Network Meets Mobile Cloud: A Social Group Utility Approach for Optimizing Computation Offloading in Cloudlet , 2016, IEEE Access.

[21]  Frank Stajano,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[22]  Hai Liu,et al.  Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[23]  Suman Nath,et al.  MaskIt: privately releasing user context streams for personalized mobile applications , 2012, SIGMOD Conference.

[24]  Rong Zheng,et al.  Efficient algorithms for K-anonymous location privacy in participatory sensing , 2012, 2012 Proceedings IEEE INFOCOM.

[25]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[26]  Josep Domingo-Ferrer,et al.  Privacy-Preserving Vehicular Communication Authentication with Hierarchical Aggregation and Fast Response , 2015, IEEE Transactions on Computers.

[27]  Liang Xiao,et al.  FuzzyDP: Fuzzy-based big data publishing against inquiry attacks , 2017, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[28]  Yuguang Fang,et al.  Protecting Location Privacy for Task Allocation in Ad Hoc Mobile Cloud Computing , 2018, IEEE Transactions on Emerging Topics in Computing.

[29]  Shaojie Tang,et al.  Adaptive Influence Maximization in Dynamic Social Networks , 2015, IEEE/ACM Transactions on Networking.

[30]  Pierangela Samarati,et al.  Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .

[31]  Shui Yu,et al.  Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.

[32]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.

[33]  Amit P. Sheth,et al.  Physical-Cyber-Social Computing: An Early 21st Century Approach , 2013, IEEE Intelligent Systems.

[34]  Qian Xu,et al.  Security-Aware Waveforms for Enhancing Wireless Communications Privacy in Cyber-Physical Systems via Multipath Receptions , 2017, IEEE Internet of Things Journal.

[35]  Wenbo He,et al.  KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.