A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments

被引:2
|
作者
Zhu, Feng [1 ]
Carpenter, Sandra [2 ]
Zhu, Wei [3 ]
Mutka, Matt W. [4 ]
机构
[1] Univ Alabama, Huntsville, AL 35899 USA
[2] Univ Alabama, Psychol, Huntsville, AL 35899 USA
[3] Intergraph Co, Madison, AL USA
[4] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
关键词
Game Theory; Identity Management; Information Protection; Pervasive Computing; Privacy;
D O I
10.4018/jisp.2010100101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In pervasive computing environments, personal information is typically expressed in digital forms. Daily activities and personal preferences with regard to pervasive computing applications are easily associated with personal identities. Privacy protection is a serious challenge. The fundamental problem is the lack of a mechanism to help people expose appropriate amounts of their identity information when accessing pervasive computing applications. In this paper, the authors propose the Hierarchical Identity model, which enables the expression of one's identity information ranging from precise detail to vague identity information. The authors model privacy exposure as an extensive game. By finding subgame perfect equilibria in the game, the approach achieves optimal exposure. It finds the most general identity information that a user should expose and which the service provider would accept. The authors' experiments show that their models can reduce unnecessary identity exposure effectively.
引用
收藏
页码:1 / 20
页数:20
相关论文
共 50 条
  • [1] RationalExposure: a Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
    Zhu, Feng
    Zhu, Wei
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), VOLS 1 AND 2, 2009, : 79 - +
  • [2] Understanding identity exposure in pervasive computing environments
    Zhu, Feng
    Carpenter, Sandra
    Kulkarni, Ajinkya
    [J]. PERVASIVE AND MOBILE COMPUTING, 2012, 8 (05) : 777 - 794
  • [3] Expose or not? A progressive exposure approach for service discovery in pervasive computing environments
    Zhu, F
    Zhu, W
    Mutka, MW
    Ni, L
    [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 225 - 234
  • [4] A Pervasive Computing Approach in Medical Emergency Environments
    Thierry, J.
    Hafner, C.
    Grasser, S.
    [J]. 11TH MEDITERRANEAN CONFERENCE ON MEDICAL AND BIOLOGICAL ENGINEERING AND COMPUTING 2007, VOLS 1 AND 2, 2007, 16 (1-2): : 1058 - 1061
  • [5] VeryIDX - A Digital Identity Management System for Pervasive Computing Environments
    Paci, Federica
    Bertino, Elisa
    Kerr, Sam
    Lint, Aaron
    Squicciarini, Anna
    Woo, Jungha
    [J]. SOFTWARE TECHNOLOGIES FOR EMBEDDED AND UBIQUITOUS SYSTEMS, PROCEEDINGS, 2008, 5287 : 268 - +
  • [6] Game-theoretic model of asymmetrical multipath selection in pervasive computing environment
    Wang, Jingyu
    Liao, Jianxin
    Li, Tonghong
    Wang, Jing
    [J]. PERVASIVE AND MOBILE COMPUTING, 2016, 27 : 37 - 57
  • [7] A Game Theoretic Approach to Optimize Transmission Strategies for Mobile Applications
    El Amrani, Mohamed
    Ait Omar, Driss
    Baslam, Mohamed
    Minaoui, Brahim
    [J]. 2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 146 - 151
  • [8] A Practical Approach to Partition Applications in Pervasive Computing Environments
    Jungum, Nevin Vunka
    Mohamudally, Nawaz
    Nissanke, Nimal
    [J]. 10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 : 74 - 81
  • [9] A Game Theoretic Approach to Optimize the Performance of Host-Based IDS
    Liu, Shuai
    Zhang, Da Yong
    Chu, Xiao
    Otrok, Hadi
    Bhattacharya, Prabir
    [J]. 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 448 - 453
  • [10] LASEC: A Localized Approach to Service Composition in Pervasive Computing Environments
    Siebert, Joanna
    Cao, Jiannong
    Lai, Yi
    Guo, Peng
    Zhu, Weiping
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (07) : 1948 - 1957