Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location Tracking

Nowadays, mobile users have a vast number of applications and services at their disposal. Each of these might impose some privacy threats on users' "Personally Identifiable Information" (PII). Location privacy is a crucial part of PII, and as such, privacy-aware users wish to maximize it. This privacy can be, for instance, threatened by a company, which collects users' traces and shares them with third parties. To maximize their location privacy, users can decide to get offline so that the company cannot localize their devices. The longer a user stays connected to a network, the more services he might receive, but his location privacy decreases. In this paper, we analyze the trade-off between location privacy, the level of services that a user experiences, and the profit of the company. To this end, we formulate a Stackelberg Bayesian game between the User (follower) and the Company (leader). We present theoretical results characterizing the equilibria of the game. To the best of our knowledge, our work is the first to model the economically rational decision-making of the service provider (i.e., the Company) in conjunction with the rational decision making of users who wish to protect their location privacy. To evaluate the performance of our approach, we have used real-data from a testbed, and we have also shown that the game-theoretic strategy of the Company outperforms non-strategic methods. Finally, we have considered different User privacy types, and have determined the service level that incentivizes the User to stay connected as long as possible.

[1]  Santiago Mazuelas,et al.  Hybrid RSS-RTT Localization Scheme for Indoor Wireless Networks , 2010, EURASIP J. Adv. Signal Process..

[2]  Tansu Alpcan,et al.  Network Security , 2010 .

[3]  Manish Jain,et al.  Quality-bounded solutions for finite Bayesian Stackelberg games: scaling up , 2011, AAMAS.

[4]  Quanyan Zhu,et al.  Game theory meets network security and privacy , 2013, CSUR.

[5]  Alan Bensky,et al.  Wireless positioning technologies and applications , 2008 .

[6]  Reza Shokri,et al.  Collaborative Location Privacy with Rational Users , 2011, GameSec.

[7]  A. Westin Social and Political Dimensions of Privacy , 2003 .

[8]  Tansu Alpcan,et al.  Trading privacy with incentives in mobile commerce: A game theoretic approach , 2013, Pervasive Mob. Comput..

[9]  Vincent Conitzer,et al.  Stackelberg vs. Nash in security games: interchangeability, equivalence, and uniqueness , 2010, AAMAS.

[10]  Gabi Nakibly,et al.  PowerSpy: Location Tracking Using Mobile Device Power Analysis , 2015, USENIX Security Symposium.

[11]  Panagiotis Papadimitratos,et al.  Ieee Transactions on Dependable and Secure Computing, Special Issue on " Security and Privacy in Mobile Platforms " , 2014 Hiding in the Mobile Crowd: Location Privacy through Collaboration , 2022 .

[12]  Panagiotis Papadimitratos,et al.  Collaborative Location Privacy , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[13]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.