DocumentCode :
623904
Title :
A game-theoretic approach for achieving k-anonymity in Location Based Services
Author :
Xinxin Liu ; Kaikai Liu ; Linke Guo ; Xiaolin Li ; Yuguang Fang
Author_Institution :
Univ. of Florida, Gainesville, FL, USA
fYear :
2013
fDate :
14-19 April 2013
Firstpage :
2985
Lastpage :
2993
Abstract :
Location Based Service (LBS), although it greatly benefits the daily life of mobile device users, has introduced significant threats to privacy. In an LBS system, even under the protection of pseudonyms, users may become victims of inference attacks, where an adversary reveals a user´s real identity and complete moving trajectory with the aid of side information, e.g., accidental identity disclosure through personal encounters. To enhance privacy protection for LBS users, a common approach is to include extra fake location information associated with different pseudonyms, known as dummy users, in normal location reports. Due to the high cost of dummy generation using resource constrained mobile devices, self-interested users may free-ride on others´ efforts. The presence of such selfish behaviors may have an adverse effect on privacy protection. In this paper, we study the behaviors of self-interested users in the LBS system from a game-theoretic perspective. We model the distributed dummy user generation as Bayesian games in both static and timing-aware contexts, and analyze the existence and properties of the Bayesian Nash Equilibria for both models. Based on the analysis, we propose a strategy selection algorithm to help users achieve optimized payoffs. Leveraging a beta distribution generalized from real-world location privacy data traces, we perform simulations to assess the privacy protection effectiveness of our approach. The simulation results validate our theoretical analysis for the dummy user generation game models.
Keywords :
Bayes methods; data privacy; game theory; mobile computing; Bayesian Nash equilibria; Bayesian game; K-anonymity; dummy user; extra fake location information; game theory; location based service; location privacy data trace; location report; moving trajectory; privacy protection effectiveness; self-interested user; selfish behavior; static aware context; timing aware context; Analytical models; Bayes methods; Correlation; Games; Privacy; Servers; Trajectory;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INFOCOM, 2013 Proceedings IEEE
Conference_Location :
Turin
ISSN :
0743-166X
Print_ISBN :
978-1-4673-5944-3
Type :
conf
DOI :
10.1109/INFCOM.2013.6567110
Filename :
6567110
Link To Document :
بازگشت