DocumentCode :
2777258
Title :
Towards a Game Theoretical Model for Identity Validation in Social Network Sites
Author :
Squicciarini, Anna Cinzia ; Griffin, Christopher ; Sundareswaran, Smitha
Author_Institution :
Inf. Sci. & Technol., Pennsylvania State Univ., University Park, PA, USA
fYear :
2011
fDate :
9-11 Oct. 2011
Firstpage :
1081
Lastpage :
1088
Abstract :
Social sites frequently ask for rich sets of user identity properties before granting access. Users are given the freedom to fail to respond to some of these requests, or can choose to submit fake identity properties, so as to reduce the risk of identification, surveillance or observation of any kind. However, this freedom has led to serious security and privacy incidents, due to the role users´ identities play in establishing social and privacy settings. In this paper, we take a step toward addressing this open problem, by analyzing the dynamics of social identity verification protocols. We use a game theoretical framework to describe a simple two-player general sum game describing the behavior of a server system (like Face book) that provides utility to users. Users can choose to register a new identity using the true information, false information or no information (and remain anonymous). Likewise, the server may choose to believe and add the prospective social user, believe and yet fail the registration, or do nothing. We show criteria on the relative payoff of providing no information (anonymity) that produce various Nash equilibria. We then show that in the presence of a binding agreement to cooperate, most players will agree to share information. This result is consistent with reality, and suggests that sites that require users to authenticate with identity information should be prepared to provide strong guarantees on privacy in order to ensure that a social contract is maintained and the sites are not damaged. To the best of our knowledge, this is the first time an analytical model is developed to study the dynamics underpinning users´ registration is social media.
Keywords :
data privacy; game theory; social networking (online); Nash equilibria; fake identity properties; game theoretical model; identity validation; privacy incidents; privacy settings; security incidents; social contract; social network sites; verification protocols; Authentication; Facebook; Games; Nash equilibrium; Privacy; Servers; anonymity; game theory; privacy; social netwroks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on
Conference_Location :
Boston, MA
Print_ISBN :
978-1-4577-1931-8
Type :
conf
DOI :
10.1109/PASSAT/SocialCom.2011.208
Filename :
6113262
Link To Document :
بازگشت