Internet privacy concerns confirm the case for intervention
Communications of the ACM
Multimedia information changes the whole privacy ballgame
Proceedings of the tenth conference on Computers, freedom and privacy: challenging the assumptions
Software security and privacy risks in mobile e-commerce
Communications of the ACM
Distributed Algorithms
A micro-economic approach to conflict resolution in mobile computing
Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering
Unpacking "privacy" for a networked world
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Who wants to know what when? privacy preference determinants in ubiquitous computing
CHI '03 Extended Abstracts on Human Factors in Computing Systems
Distributed PIN verification scheme for improving security of mobile devices
Mobile Networks and Applications - Security in mobile computing environments
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Uncovering privacy attitudes and practices in instant messaging
GROUP '05 Proceedings of the 2005 international ACM SIGGROUP conference on Supporting group work
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
Game Theory for Wireless Engineers (Synthesis Lectures on Communications)
Game Theory for Wireless Engineers (Synthesis Lectures on Communications)
SmokeScreen: flexible privacy controls for presence-sharing
Proceedings of the 5th international conference on Mobile systems, applications and services
A flexible security architecture to support third-party applications on mobile devices
Proceedings of the 2007 ACM workshop on Computer security architecture
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
A framework for data quality and feedback in participatory sensing
Proceedings of the 5th international conference on Embedded networked sensor systems
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Social disclosure of place: from location technology to communication practices
PERVASIVE'05 Proceedings of the Third international conference on Pervasive Computing
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
A new generation of community-based social networking mobile applications is emerging. In these applications, there is often a fundamental tension between users' desire for preserving the privacy of their own data and their need for fine-grained information about others. Our work is motivated by a community-based mobile application called Aegis, a personal safety enhancement service based on sharing location information with trusted nearby friends. We model the privacy-participation tradeoffs in this application using a game theoretic formulation. Users in this game are assumed to be self-interested. They prefer to obtain more fine-grained knowledge from others while limiting their own privacy leak (i.e. their own contributions to the game) as much as possible. We design a tit-for-tat mechanism to give user incentives to contribute to the application. We investigate the convergence of two best response dynamics to achieve a non-trivial Nash equilibrium for this game. Further, we propose an algorithm that yields a Pareto optimal Nash equilibrium. We show that this algorithm guarantees polynomial time convergence and can be executed in a distributed manner.