Skip to main content

Collaborative Location Privacy with Rational Users

  • Conference paper
Decision and Game Theory for Security (GameSec 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7037))

Included in the following conference series:

Abstract

Recent smartphones incorporate embedded GPS devices that enable users to obtain geographic information about their surroundings by providing a location-based service (LBS) with their current coordinates. However, LBS providers collect a significant amount of data from mobile users and could be tempted to misuse it, by compromising a customer’s location privacy (her ability to control the information about her past and present location). Many solutions to mitigate this privacy threat focus on changing both the architecture of location-based systems and the business models of LBS providers. MobiCrowd does not introduce changes to the existing business practices of LBS providers, rather it requires mobile devices to communicate wirelessly in a peer-to-peer fashion. To lessen the privacy loss, users seeking geographic information try to obtain this data by querying neighboring nodes, instead of connecting to the LBS. However, such a solution will only function if users are willing to share regional data obtained from the LBS provider. We model this collaborative location-data sharing problem with rational agents following threshold strategies. Initially, we study agent cooperation by using pure game theory and then by combining game theory with an epidemic model that is enhanced to support threshold strategies to address a complex multi-agent scenario. From our game-theoretic analysis, we derive cooperative and non-cooperative Nash equilibria and the optimal threshold that maximizes agents’ expected utility.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alpcan, T.: Network Security: A Decision and Game-Theoretic Approach. Cambridge University Press (2010)

    Google Scholar 

  2. BaĹźar, T., Olsder, G.: Dynamic noncooperative game theory. Society for Industrial Mathematics (1999)

    Google Scholar 

  3. Bauch, C., Earn, D.: Vaccination and the theory of games. Proceedings of the National Academy of Sciences of the United States of America 101(36), 13391 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  4. Buttyan, L., Hubaux, J.P.: Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing. Cambridge University Press, New York (2007)

    Book  Google Scholar 

  5. Dhar, S., Varshney, U.: Challenges and business models for mobile location-based services and advertising. Commun. ACM 54, 121–128 (2011), http://doi.acm.org/10.1145/1941487.1941515

    Article  Google Scholar 

  6. Earn, D.: A Light Introduction to Modelling Recurrent Epidemics. In: Brauer, F., van den Driessche, P., Wu, J. (eds.) Mathematical Epidemiology. Lecture Notes in Mathematics, vol. 1945, pp. 3–17. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  7. Felegyhazi, M., Hubaux, J., Buttyan, L.: Nash equilibria of packet forwarding strategies in wireless ad hoc networks. IEEE Transactions on Mobile Computing 5(5), 463–476 (2006)

    Article  Google Scholar 

  8. Freudiger, J., Manshaei, M.H., Hubaux, J.P., Parkes, D.C.: On Non-cooperative Location Privacy: A Game-theoretic Analysis. In: ACM Conference on Computer and Communications Security (CCS) (2009), http://www.sigsac.org/ccs/CCS2009/

  9. Humbert, M., Manshaei, M.H., Freudiger, J., Hubaux, J.-P.: Tracking Games in Mobile Networks. In: Alpcan, T., Buttyán, L., Baras, J.S. (eds.) GameSec 2010. LNCS, vol. 6442, pp. 38–57. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  10. Krumm, J.: A survey of computational location privacy. Personal and Ubiquitous Computing 13(6), 391–399 (2009)

    Article  Google Scholar 

  11. Manshaei, M., Zhu, Q., Alpcan, T., Basar, T., Hubaux, J.P.: Game Theory Meets Network Security and Privacy. Tech. rep., École Polytechnique Fédérale de Lausanne, Lausanne (2010)

    Google Scholar 

  12. Olumofin, F., Tysowski, P.K., Goldberg, I., Hengartner, U.: Achieving Efficient Query Privacy for Location Based Services. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 93–110. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  13. Osborne, M., Rubinstein, A.: A Course in Game Theory. The MIT press (1994)

    Google Scholar 

  14. Shokri, R., Papadimitratos, P., Theodorakopoulos, G., Hubaux, J.P.: Collaborative Location Privacy. In: 2011 IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, MASS (2011)

    Google Scholar 

  15. Theodorakopoulos, G., Le Boudec, J.Y., Baras, J.S.: Selfish Response to Epidemic Propagation. IEEE Transactions on Automatic Control (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Santos, F., Humbert, M., Shokri, R., Hubaux, JP. (2011). Collaborative Location Privacy with Rational Users. In: Baras, J.S., Katz, J., Altman, E. (eds) Decision and Game Theory for Security. GameSec 2011. Lecture Notes in Computer Science, vol 7037. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25280-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25280-8_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25279-2

  • Online ISBN: 978-3-642-25280-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics