• DocumentCode
    623904
  • Title

    A game-theoretic approach for achieving k-anonymity in Location Based Services

  • Author

    Xinxin Liu ; Kaikai Liu ; Linke Guo ; Xiaolin Li ; Yuguang Fang

  • Author_Institution
    Univ. of Florida, Gainesville, FL, USA
  • fYear
    2013
  • fDate
    14-19 April 2013
  • Firstpage
    2985
  • Lastpage
    2993
  • Abstract
    Location Based Service (LBS), although it greatly benefits the daily life of mobile device users, has introduced significant threats to privacy. In an LBS system, even under the protection of pseudonyms, users may become victims of inference attacks, where an adversary reveals a user´s real identity and complete moving trajectory with the aid of side information, e.g., accidental identity disclosure through personal encounters. To enhance privacy protection for LBS users, a common approach is to include extra fake location information associated with different pseudonyms, known as dummy users, in normal location reports. Due to the high cost of dummy generation using resource constrained mobile devices, self-interested users may free-ride on others´ efforts. The presence of such selfish behaviors may have an adverse effect on privacy protection. In this paper, we study the behaviors of self-interested users in the LBS system from a game-theoretic perspective. We model the distributed dummy user generation as Bayesian games in both static and timing-aware contexts, and analyze the existence and properties of the Bayesian Nash Equilibria for both models. Based on the analysis, we propose a strategy selection algorithm to help users achieve optimized payoffs. Leveraging a beta distribution generalized from real-world location privacy data traces, we perform simulations to assess the privacy protection effectiveness of our approach. The simulation results validate our theoretical analysis for the dummy user generation game models.
  • Keywords
    Bayes methods; data privacy; game theory; mobile computing; Bayesian Nash equilibria; Bayesian game; K-anonymity; dummy user; extra fake location information; game theory; location based service; location privacy data trace; location report; moving trajectory; privacy protection effectiveness; self-interested user; selfish behavior; static aware context; timing aware context; Analytical models; Bayes methods; Correlation; Games; Privacy; Servers; Trajectory;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    INFOCOM, 2013 Proceedings IEEE
  • Conference_Location
    Turin
  • ISSN
    0743-166X
  • Print_ISBN
    978-1-4673-5944-3
  • Type

    conf

  • DOI
    10.1109/INFCOM.2013.6567110
  • Filename
    6567110