Community structure-based trilateral stackelberg game model for privacy protection

Abstract Location-based services are widely used in mobile applications, which not only bring convenience, but also cause serious privacy concerns. Based on the characteristics of social network, this work proposes a cooperative protection architecture to model the relationship among users, communities and location-based service. Furthermore, in order to construct K anonymity set, a novel community structure-based trilateral Stackelberg game model is developed for K-anonymity protection. In addition, an optimization method based on the proposed model is designed by the backward induction process. Finally, the security and the performance under different situations such as the anonymity parameter K and the community structure parameter overlapping weights are analyzed. The analysis results indicate that the proposed model and the optimization method are effective for privacy protection and can achieve high secure in location-based services.

[1]  Chang Wen Chen,et al.  SSPA-LBS: Scalable and Social-Friendly Privacy-Aware Location-Based Services , 2019, IEEE Transactions on Multimedia.

[2]  Jacques Periaux,et al.  Constraints handling in Nash/Adjoint optimization methods for multi-objective aerodynamic design , 2014 .

[3]  Lin Zhang,et al.  Cyber-Physical-Social Aware Privacy Preserving in Location-Based Service , 2018, IEEE Access.

[4]  Marco Gruteser,et al.  USENIX Association , 1992 .

[5]  Fengyuan Xu,et al.  A Geo-Indistinguishable Location Perturbation Mechanism for Location-Based Services Supporting Frequent Queries , 2017, IEEE Transactions on Information Forensics and Security.

[6]  H. Vincent Poor,et al.  Community-Structured Evolutionary Game for Privacy Protection in Social Networks , 2018, IEEE Transactions on Information Forensics and Security.

[7]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[8]  Murat Kantarcioglu,et al.  Expanding Access to Large-Scale Genomic Data While Promoting Privacy: A Game Theoretic Approach. , 2017, American journal of human genetics.

[9]  Hua Wang,et al.  Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing , 2008, Trans. Data Priv..

[10]  Richeng Jin,et al.  Leveraging Spatial Diversity for Privacy-Aware Location-Based Services in Mobile Networks , 2018, IEEE Transactions on Information Forensics and Security.

[11]  Reza Shokri,et al.  Privacy Games: Optimal User-Centric Data Obfuscation , 2014, Proc. Priv. Enhancing Technol..

[12]  Shuigeng Zhou,et al.  A novel privacy preserving method for data publication , 2019, Inf. Sci..

[13]  Xianbin Wang,et al.  Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication , 2018, IEEE Transactions on Vehicular Technology.

[14]  Ming Zhang,et al.  New evolutionary game model of the regional governance of haze pollution in China , 2018, Applied Mathematical Modelling.

[15]  Carmela Troncoso,et al.  Protecting location privacy: optimal strategy against localization attacks , 2012, CCS.

[16]  T. Vicsek,et al.  Uncovering the overlapping community structure of complex networks in nature and society , 2005, Nature.

[17]  Adam Wierzbicki,et al.  Verifying social network models of Wikipedia knowledge community , 2016, Inf. Sci..

[18]  Gang Kou,et al.  A review on trust propagation and opinion dynamics in social networks and group decision making frameworks , 2019, Inf. Sci..

[19]  Zhili Tang,et al.  Natural laminar flow shape optimization in transonic regime with competitive Nash game strategy , 2017 .

[20]  Hai Liu,et al.  An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism , 2016, Soft Computing.

[21]  Xingyi Zhang,et al.  A Mixed Representation-Based Multiobjective Evolutionary Algorithm for Overlapping Community Detection , 2017, IEEE Transactions on Cybernetics.

[22]  Raymond Chi-Wing Wong,et al.  (α, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing , 2006, KDD '06.

[23]  Carmela Troncoso,et al.  Privacy Games Along Location Traces , 2016, ACM Trans. Priv. Secur..

[24]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[25]  Ashwin Machanavajjhala,et al.  l-Diversity: Privacy Beyond k-Anonymity , 2006, ICDE.

[26]  Chen Wang,et al.  ILLIA: Enabling $k$ -Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries , 2018, IEEE Internet of Things Journal.

[27]  Zhili Tang,et al.  Solving Stackelberg equilibrium for multi objective aerodynamic shape optimization , 2019, Applied Mathematical Modelling.

[28]  Min Chen,et al.  Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services , 2018, IEEE Transactions on Mobile Computing.

[29]  S. Sitharama Iyengar,et al.  Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks , 2018, 2018 IEEE Symposium on Computers and Communications (ISCC).

[30]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[31]  Ling Liu,et al.  Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms , 2008, IEEE Transactions on Mobile Computing.

[32]  Jun Dong,et al.  Distributed optimization using virtual and real game strategies for multi-criterion aerodynamic design , 2008 .

[33]  Lei Li,et al.  Cognitive Approach for Location Privacy Protection , 2018, IEEE Access.