A Game-Theoretic Approach to Indistinguishability of Winning Objectives as User Privacy

被引:0
|
作者
Nakanishi, Rindo [1 ]
Takata, Yoshiaki [2 ]
Seki, Hiroyuki [1 ]
机构
[1] Nagoya Univ, Grad Sch Informat, Furo Cho, Nagoya, Aichi 4648601, Japan
[2] Kochi Univ Technol, Sch Informat, Kochi 7828502, Japan
关键词
graph game; Muller objective; O-indistinguishable strategy; objective-indistinguishability equilibrium; NASH EQUILIBRIA; COMPLEXITY; FOUNDATIONS; ANONYMITY;
D O I
10.1007/978-3-031-47963-2_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Game theory on graphs is a basic tool in computer science. In this paper, we propose a new game-theoretic framework for studying the privacy protection of a user who interactively uses a software service. Our framework is based on the idea that an objective of a user using software services should not be known to an adversary because the objective is often closely related to personal information of the user. We propose two new notions, O-indistinguishable strategy (O-IS) and objective-indistinguishability equilibrium (OIE). For a given game and a subset O of winning objectives (or objectives in short), a strategy of a player is O-indistinguishable if an adversary cannot shrink O by excluding any objective from O as an impossible objective. A strategy profile, which is a tuple of strategies of all players, is an OIE if the profile is locally maximal in the sense that no player can expand her set of objectives indistinguishable from her real objective from the viewpoint of an adversary. We show that for a given multiplayer game with Muller objectives, both of the existence of an O-IS and that of OIE are decidable.
引用
收藏
页码:36 / 54
页数:19
相关论文
共 50 条
  • [1] Game-Theoretic Approach for User Migration in Diaspora
    Hasan, Mohammad Rashedul
    Shehab, Mohamed
    Noorollahiravari, Ali
    [J]. 2013 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2013, : 34 - 38
  • [2] Evolutionary Game-Theoretic Approach for Analyzing User Privacy Disclosure Behavior in Online Health Communities
    Xu, Zhongyang
    Chen, Xihui
    Hong, Yuanxiao
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (13):
  • [3] Privacy-Preserving Data Mining: A Game-Theoretic Approach
    Miyaji, Atsuko
    Rahman, Mohammad Shahriar
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 186 - 200
  • [4] User-Tailored Document Planning - A Game-Theoretic Approach
    Klabunde, Ralf
    Kornrumpf, Alexander
    [J]. ADVANCES IN NATURAL LANGUAGE PROCESSING, 2010, 6233 : 209 - 214
  • [5] An Evolutionary Game-Theoretic Approach for Assessing Privacy Protection in mHealth Systems
    Zhu, Guang
    Liu, Hu
    Feng, Mining
    [J]. INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2018, 15 (10)
  • [6] Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach
    Jin, Richeng
    He, Xiaofan
    Dai, Huaiyu
    Dutta, Rudra
    Ning, Peng
    [J]. 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 72 - 83
  • [7] Overbuilding: A game-theoretic approach
    Wang, K
    Zhou, YQ
    [J]. REAL ESTATE ECONOMICS, 2000, 28 (03) : 493 - 522
  • [8] Game-Theoretic Strategy for Personalized Privacy Protection
    Yu, Chao
    Shi, Yuliang
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (04): : 123 - 138
  • [9] Desuetudo: A Game-Theoretic Approach
    Faroldi, Federico L. G.
    [J]. ARCHIV FUR RECHTS- UND SOZIALPHILOSOPHIE, 2021, 107 (02): : 289 - 299
  • [10] Social Computing and User-generated Content: A Game-Theoretic Approach
    Ghosh, Arpita
    [J]. ACM SIGECOM EXCHANGES, 2012, 11 (02) : 16 - 21