Next Article in Journal
A Review of Wearable Technologies for Elderly Care that Can Accurately Track Indoor Position, Recognize Physical Activities and Monitor Vital Signs in Real Time
Next Article in Special Issue
An Auction-Based Spectrum Leasing Mechanism for Mobile Macro-Femtocell Networks of IoT
Previous Article in Journal
Fusion of Inertial/Magnetic Sensor Measurements and Map Information for Pedestrian Tracking
Previous Article in Special Issue
Application of Fault Tree Analysis and Fuzzy Neural Networks to Fault Diagnosis in the Internet of Things (IoT) for Aquaculture
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Context Sensing System Analysis for Privacy Preservation Based on Game Theory †

1
College of Information Science and Technology, Beijing Normal University, Beijing 100875, China
2
Department of Physics, Beijing Normal University, Beijing 100875, China
3
Telecommunications Engineering with Management, International School, Beijing University of Posts and Telecommunications, Beijing 100876, China
*
Author to whom correspondence should be addressed.
This paper is an extended version of our paper published in Li, L.; Wang, S.; Guo, J.; et al. Extensive Form Game Analysis Based on Context Privacy Preservation for Smart Phone Applications. In Proceedings of the International Conference on Wireless Algorithms, Systems, and Applications, Bozeman, MT, USA, 8–10 August 2016; Springer International Publishing: Gewerbestrasse, Switzerland, 2016; pp. 389–400.
Sensors 2017, 17(2), 339; https://doi.org/10.3390/s17020339
Submission received: 1 December 2016 / Revised: 12 January 2017 / Accepted: 6 February 2017 / Published: 10 February 2017

Abstract

:
In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user’s contexts, based on which it provides personalized services. However, the application may sell the user’s contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one.

1. Introduction

Nowadays, smart phones equipped with various sensors can access users’ privacy information, including geographical coordinates, moving speed or call records. Users’ privacy information reflects the contexts they are in, such as locations, mobility modes and social states, as well as their current needs. Hence, context-aware applications arise, inferring a user’s contexts based on which some personalized services can be provided. Examples of context-aware applications include GeoNote, which calls attention to the user once he or she is at a particular location, and Gudong, which records the user’s sports information and develops corresponding motion tasks.
However, once a context-aware application knows a user’s context information, the user cannot know how the application will use it. In some cases, the application may sell user’s contexts to some malicious adversaries to earn extra profits, thus hindering its widespread use due to information disclosure. To solve this problem, it is key to control the release of user’s contexts. However, it is challenging, because the user of a context-aware application needs to trade off between privacy protection and service quality. In detail, a user may reject releasing his/her contexts to the application considering privacy protection, but such behavior means giving up personalized services provided by the application completely, and vice versa.
Currently, most privacy protection techniques for mobile applications focus on location protection, neglecting the diversity of users’ privacy and different degrees of users’ context sensitivity. Limited research on context privacy preservation are MaskIt [1,2]. MaskIt [1] introduces an approach to filter a user context stream that provably preserves privacy, a privacy check deciding whether to release or suppress the current user context. However, the adversary is only allowed to make a fixed attack and cannot adjust its strategies according to different context sensitivity; while in the real world, the adversary will adapt its attacking strategies to different situations for achieving better profits. For example, advertisers may push hotel advertisements if they have inferred that a potential user will go to a new city. The work in [2] overcomes this shortcoming and considers a more sensitive and realistic adversary in its framework of context privacy protection. It uses a two-player game formulation involving a mobile phone user and the adversary to analyze the context privacy problem. Unfortunately, both [1,2] do not realize the important role that the application plays.
In fact, whether an adversary can obtain a user’s context information depends directly on whether the application leaks it. Although leaking contexts will increase the application’s profits, it will also harm the application’s credibility and the trust from the user. Thus, a reasonable strategy of the application is to trade off between maintaining credibility and obtaining benefits by leakage. Once considering the application’s strategy, the two-player game in the existing work needs to be extended to the three-player game, which leads to different methods of analysis and conclusions.
Defining the context sensing system as the one consisting of the sensor-equipped mobile phone user, the context-aware application and the malicious adversary, we analyze it by taking advantage of the single three-player game model and the repeated one. Our aim is to figure out under which conditions the user, the application and the adversary behave well (the user releases, the application does not leak and the adversary does not retrieve the context). For single-stage game analysis, we analyze the trade offs among the behaviors of the three parties, and then, we use the game tree to formulate their one-round decision-making process. After analyzing the key impact factors on their payoffs, for example the context sensitivity, the credibility of the application and the cost of retrieving contexts, we construct payoff functions for the three parties, based on which we solve and analyze their Nash equilibriums. For repeated game analysis, we study how the equilibrium results of a single-stage game develop in repeated game and put forward a social norm that preserves context privacy, as well as calculate the condition of three players in complying with the social norm. Our study shows that in a single interaction among the players, the key of context privacy preservation is to establish a sound reputation mechanism for context-aware applications, through which the issue of context privacy can be eliminated utterly. As a consequence, trust between users and mobile applications can be built; while in the multiple interactions among the players, the condition of the players not deviating from the cooperation strategy is that the patience of the players to participate in the future game is in some reasonable range. In this case, the punishment from the social norm will effectively prevent the action of privacy leakage.
The rest of the paper is organized as follows. Section 2 introduces related work. We then provide the single-stage game analysis based on the extensive form game formulation in Section 3. Section 4 presents the repeated game analysis. Then, numerical analysis is described in Section 5. Finally, we conclude in Section 6.

2. Related Work

As previously described, many approaches have been proposed to protect the privacy of mobile phones [3,4,5,6], while most studies on privacy preservation for mobile applications focus on location preservation. To this end, the anonymization technique is widely used, of which k-anonymization is the classic one. K-anonymization requires there to be a certain amount of indistinguishable records in the quasi-identifier, so that adversaries cannot distinguish the specific user, thus preserving privacy [7,8,9], while k-anonymization falls short in some scenarios, for example when the k individuals are in the same sensitive location.
Anther important privacy protection approach is achieved by encryption [10,11]. Encryption is a special algorithm to change the original information, so that even if an unauthorized user gets access to encrypted information, he or she still cannot understand the actual meaning of it, having no idea of the decryption method. It is usually used to protect data in storage or in transit. As its computational complexity is high, it is not applicable for a mobile phone user.
From the perspective of methodological research, game theory has been widely applied to many strategic interaction scenarios, including natural disasters and homeland security. The work in [12] proposes a model for allocating defensive investment between terrorism and natural disasters by applying game theory to identify equilibrium strategies for both the attacker and defender in the model. The work in [13,14] introduces the game-theoretic optimization framework in which the insurer decision model interacts with a utility-based homeowner to help understand and manage the insurer’s role in catastrophe risk management. The work in [15] is the first game-theoretic study for modeling and optimally disrupting a terrorism supply chain in a complex four-player scenario.
MaskIt [1] and [2] are the only research works studying the context privacy preservation. MaskIt [1] is a middleware deciding whether the user releases current contexts for privacy protection. Even when the adversary knows the correlations between contexts, MaskIt [1] can prevent it from finding out in what sensitive context the user is. The work in [2] proposes a framework of context privacy in the case that the adversary can adapt attack strategies according to the historical records of contexts. However, as noted earlier, [1,2] do not take into account the application’s capability to participate in the decision-making process, which stimulates our work.

3. Single-Stage Game Analysis Based on the Extensive Form Game Formulation

In this section, we analyze the context privacy issue of the context sensing system in a single interaction among three players in detail.

3.1. Problem Statement and the Extensive Form Game Formulation

As illustrated in Figure 1, a context-sensing system consists of the user, the application and the adversary, which are in conflict. Actually, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. In detail, the mobile phone user can determine whether to release these sensing data to the application, for it should trade off between gaining personalized services and protecting individual privacy. In the meantime, the application needs to decide whether to expose extracted contexts to malicious adversary. The leakage of the privacy may harm its credibility, but gain profits from the adversary, so the application needs to trade off between maintaining credibility and making a profit by leakage. Due to computational constraints and limited bandwidth used for retrieving contexts, the adversary cannot carry on the attack continually, which has already been adopted by [2]. Hence, the adversary needs to determine when to retrieve the contexts from the application in order to trade off between obtaining contexts and lowering the cost of retrieval. The adversary’s decisions affect those of the user and the application. For example, if the adversary chooses not to retrieve the context, the user will feel safe to release his or her context, and the application will not leak it in a later stage.
To analyze the context privacy issue of the context sensing system in a single interaction among three players, we use the extensive form game model, which takes advantage of the game tree, depicted in Figure 2. The game tree can be represented as a three-tuple Σ = ( N , A , h ) . N = u s e r , a p p l i c a t i o n m , a d v e r s a r y is the set of the players in the game. A = α 1 , α 2 , β 1 , β 2 , γ 1 , γ 2 is the arc set, indicating the players’ actions. α 1 and α 2 are respectively releasing temporal context c to the application and not. β 1 and β 2 are respectively leaking c to the adversary and not. Similarly, γ 1 and γ 2 are respectively retrieving c from the application and not. h : ω i R n is the set of players’ payoffs when reaching the play ω i . As shown in the game tree, the user has two choices α 1 and α 2 , and if he or she chooses α 1 , the application will also have two actions, β 1 and β 2 , and so does the adversary. Ultimately, there will be six different paths (note that when the user chooses α 2 , the application has to choose β 2 , because the application receives nothing from the user then), which reaches six kinds of plays ω i ( i = 1 , , 6 ) . For example, if the user releases his or her current context, and the application chooses to leak it, and the adversary retrieves it; their game will reach the play ω 1 , so that their payoffs are h u ( ω 1 ) , h a ( ω 1 ) and h a d ( ω 1 ) accordingly.

3.2. Payoff Function

Since each player’s strategy is driven by his or her payoff, we introduce each player’s payoff in detail as follows. Especially, in this paper, each player’s strategy is defined as the probability of taking the above actions. For example, the strategy of the user is the probability of α 1 , releasing the current context c. Let η, λ and θ respectively refer to the players’ strategies, the probability to release, leak and retrieve context.

3.2.1. The User’s Payoff Function

According to the analysis before, a user should trade off between service quality and privacy protection. In fact, context privacy loss is closely related to the sensitive context. For example, going to the cinema may not be so sensitive, while going to the hospital may be a very important privacy issue for most users. To measure the degree of the context privacy loss, we use the following formula:
S e n s ( c ) = t = 0 c s C s τ t | P r [ C t = c s | C 0 = c ] P r [ C t = c s ] | ,
where 0 < τ < 1 is the discount factor of the context privacy, P r the probability, C t the context happening at time t and C 0 the context happening at time 0. c s is a certain sensitive context of the user, and C s is the set of it.
According to Equation (1), the context sensitivity of c is the accumulated difference between the prior belief and the posterior one after viewing the user’s present context being in the sensitive context from the future perspective [2]. The prior belief refers to a prediction of the user being in a certain sensitive context c s . The larger the difference above, the less the adversary would learn information about the user being in a private state from the released data. To this end, we consider context sensitivity as the measure of the degree of context privacy loss.
Based on the analysis above, when a user releases c, which will be leaked by the application and further be retrieved to the adversary, the user’s payoff is:
U u ( c ) = Q ( c ) k 1 S e n s ( c ) i f η = 1 , λ = 1 a n d θ = 1 , Q ( c ) i f η = 1 a n d λ = 0 o r θ = 0 , 0 i f η = 0 ,
where Q ( c ) is the profit of being served by the application after releasing c and k 1 > 0 is the coefficient reflecting the negative impact of the context privacy loss on the user’s payoff. When a user releases c, which will be leaked by the application and further be retrieved for the adversary, the user’s payoff is Q ( c ) k 1 S e n s ( c ) . Obviously, if the user does not release c, its payoff will be zero. Additionally, if the application does not leak or the adversary does not retrieve c, his or her payoff will be Q ( c ) without any privacy loss.

3.2.2. The Application’s Payoff Function

Obviously, the credibility of the application is positively related to the user’s profit of being served by the application and negatively related to context privacy loss. Here, when the user releases, and the application leaks c; the credibility of the application because of providing services and leaking privacy can be formulated as:
C r e ( c ) = Q ( c ) k 2 S e n s ( c ) ,
where k 2 > 0 is the coefficient reflecting the negative impact of selling context on the application’s credibility; while, when the user does not release c, the application can do nothing, without any services provided to the user and any contexts leaked to the adversary, thus with zero credibility as a consequence.
If the application leaks a context to the adversary, it will gain some certain profits. Additionally obviously, the more sensitive the context is, meaning higher value to the adversary, the more profits the application will gain.
Thus, the application’s payoff is:
U a ( c ) = Q ( c ) + ( k 3 k 2 ) S e n s ( c ) i f η = 1 , λ = 1 a n d θ = 1 , Q ( c ) i f η = 1 a n d λ = 0 o r θ = 0 , 0 i f η = 0 ,
where k 3 > 0 is the coefficient reflecting the positive impact of selling c on the application’s payoff. When the application leaks c released by the user and further retrieved by the adversary, its payoff is Q ( c ) k 1 S e n s ( c ) . However, if the application does not leak c or the adversary does not retrieve, leading to zero context privacy exposure, the application’s payoff is Q ( c ) .

3.2.3. The Adversary’s Payoff Function

The adversary’s payoff by retrieving c depends on how valuable the retrieved context is, which is proportional to the context sensitivity. Thus, his or her payoff is:
U a d ( c ) = k 4 S e n s ( c ) C i f η = 1 , λ = 1 a n d θ = 1 , Q ( c ) i f λ = 0 a n d θ = 1 , 0 i f θ = 0 ,
where C is the cost of retrieving a context and k 4 > 0 is the coefficient reflecting the positive impact of retrieving the context on the adversary’s payoff. When the adversary retrieves a context released by the user and leaked by the application, its payoff is k 4 S e n s ( c ) C . Besides, when the application does not leak c, the payoff of the adversary to retrieve is C , and the payoff of the adversary not to is zero.
In summary, the payoffs of the players in every play ω i ( i = 1 , 2 , , 6 ) are shown in Table 1 below, where h u ( ω i ) , h a ( ω i ) and h a d ( ω i ) denote the payoffs of the user, the application and the adversary respectively in the play ω i .
For example, in play ω 1 , their actions are α 1 , β 1 , γ 1 , which means the user releases, the application leaks and the adversary retrieves c. Accordingly, their payoffs are h u ( ω 1 ) = Q ( c ) k 1 S e n s ( c ) , h a ( ω 1 ) = Q ( c ) + ( k 3 k 2 ) S e n s ( c ) and h a d ( ω 1 ) = C + k 4 S e n s ( c ) .

3.3. Solving and Analyzing the Nash Equilibrium

3.3.1. The Solution of the Nash Equilibrium

To solve each player’s Nash equilibrium, we transform the extensive form game to the strategic one. The probability s ( ω i ) of each play ω i can be represented as the function of η, λ and θ. For example, the probability of s ( ω 1 ) and s ( ω 2 ) is respectively η λ θ and η λ ( 1 θ ) . The rest can be deduced by analogy.
Based on the player’ payoff h ( ω i ) ∈ { h u ( ω i ) , h a ( ω i ) , h a d ( ω i ) } and the probability s ( ω i ) in each play ω i , the player’s mathematical payoff expectations E can be calculated by the equation as follows:
E = i = 1 6 s ( ω i ) h ( ω i ) .
Thus, with a given c, the mathematical payoff expectation of the user, the application and the adversary, namely E ( U u ( c ) ) , E ( U a ( c ) ) and E ( U a d ( c ) ) , is listed below:
( 7 ) E ( U u ( c ) ) = Q ( c ) η k 1 S e n s ( c ) η λ θ ( 8 ) E ( U a ( c ) ) = Q ( c ) η + ( k 3 k 2 ) S e n s ( c ) η λ θ ( 9 ) E ( U a d ( c ) ) = C θ + k 4 S e n s ( c ) η λ θ .
In the context sensing system, all of the players try to maximize their payoffs by adjusting their strategies. For example, the user tries to maximize E ( U u ( c ) ) by the way of controlling the probability of releasing c. Similar situations happen to the application and the adversary. Their optimal strategies can be obtained by solving the equations as follows:
E ( U u ( c ) ) η = Q ( c ) k 1 S e n s ( c ) λ θ = 0 E ( U a ( c ) ) λ = ( k 3 k 2 ) S e n s ( c ) η θ = 0 E ( U a d ( c ) ) θ = C + k 4 S e n s ( c ) η λ = 0
As a result, we can obtain the following two propositions.
Proposition 1.
When k 3 > k 2 , the optimal strategies of the user, the application and the adversary are respectively η = C k 4 S e n s ( c ) , λ = 1 and θ = Q ( c ) k 1 S e n s ( c ) .
Proof of Proposition 1.
When k 3 > k 2 , obviously E ( U a ( c ) ) λ 0 , which means E ( U a ( c ) ) is non-decreasing. Thus, when λ = 1 , E ( U a ( c ) ) takes the maximum value. Putting λ = 1 into the other two equations, we can easily get η = C k 4 S e n s ( c ) and θ = Q ( c ) k 1 S e n s ( c ) . ☐
Proposition 2.
When k 3 < k 2 , the optimal strategies of the user, the application and the adversary are respectively η = 1 , λ = 0 and θ = 0 .
Proof of Proposition 2.
When k 3 < k 2 , obviously E ( U a ( c ) ) λ 0 , which means E ( U a ( c ) ) is non-increasing. Thus, when λ = 0 , E ( U a ( c ) ) takes the maximum value, making η = 1 , θ = 0 is easily obtained through the other two equations. ☐
Due to k 2 reflecting the negative impact of selling context on the application’s payoff and k 2 reflecting the positive one, Proposition 2 indicates that the key of context privacy preservation is to establish a sound reputation mechanism for context-aware applications, through which the issue of context privacy can be eliminated utterly. As a consequence, trust between users and mobile applications can be built.

3.3.2. The Analysis of the Nash Equilibrium

According to the two theorems above, k 3 and k 2 are critical factors influencing the strategies of the user, the application and the adversary in the single interaction among them. k 3 > k 2 represents that, given the same context sensitivity, the profits of the application by leaking the context are more than its credibility losses. In that case, the application will leak the contexts definitely, which is consistent with λ = 1 . Similarly, k 3 < k 2 means that the profits of the application by context leakage are less than its credibility losses. Then, the application will choose not to leak the context, which is also consistent with λ = 0 .
When k 3 > k 2 , the solution above should satisfy the following constraints:
0 δ = C k 4 S e n s ( c ) 1 0 θ = Q ( c ) k 1 S e n s ( c ) 1 ,
that is,
k 4 S e n s ( c ) C 0 k 1 S e n s ( c ) Q ( c ) 0
From Table 1, when the adversary chooses γ 1 , its payoff is either of k 4 S e n s ( c ) C and C . Additionally, when it chooses γ 2 , its payoff is zero. If k 4 S e n s ( c ) C 0 , the adversary’s payoff of γ 1 is always less than its payoff of γ 2 , which means the pure strategy Nash equilibrium exists. This does not accord with the precondition of the mixed strategy Nash equilibrium. Thus, there is the constraint k 4 S e n s ( c ) C 0 .
Similarly, when the user chooses α 1 , his or her payoff is either of Q ( c ) k 1 S e n s ( c ) and Q ( c ) . Additionally, the user’s payoff of α 2 is zero. If Q ( c ) k 1 S e n s ( c ) 0 , the user’s payoff of α 1 is always greater than his or her payoff of α 2 , which means the pure strategy Nash equilibrium exists. This does not accord with the precondition of the mixed strategy Nash equilibrium, either. Thus, there is the constraint Q ( c ) k 1 S e n s ( c ) 0 , that is k 1 S e n s ( c ) Q ( c ) 0 .

4. Repeated Game Analysis

It should be noted that the user, the application and the adversary can interact with each other repeatedly, which means we can model their interactive process as a repeated game. In this case, the players will take into account the future payoffs while taking strategies. Besides, it is possible for the adversary to use some technological means to conceal the identity of the leaking application at a certain cost to get better payoffs. Therefore, we conduct repeated game analysis from the two scenarios, the adversary to conceal the identity of the application and not to.

4.1. Not Concealing the Identity of the Application

We fist analyze the context privacy issue of the context sensing system where the players can interact with each other repeatedly, when the adversary does not have the capability or is not willing to conceal the identity of the application.
Compared to the single-stage game, the repeated game may lead to some more complex equilibrium results. The solution of the repeated game is to find the equilibrium strategy path with stable characteristics, and the equilibrium path is connected by the results of every stage game.
When k 3 < k 2 , the result of optimal strategies, η = 1 , λ = 0 and θ = 0 is the only pure strategy Nash equilibrium. According to [16], the only subgame perfect Nash equilibrium solution of the repeated game is that each game player adopts the Nash equilibrium strategy of the original game in each stage, if the original game has only one pure strategy Nash equilibrium. Therefore, the equilibrium results of the corresponding repeated game will be that the user releases, the application does not leak and the adversary does not retrieve the context in every stage game. Then, the players all behave well, and the context privacy is protected.
As for k 3 > k 2 , the result of optimal strategies, η = C k 4 S e n s ( c ) , λ = 1 and θ = Q ( c ) k 1 S e n s ( c ) , is a mixed strategy Nash equilibrium. When it comes to the repeated game, some problems arise. There is no final stage in the infinite repeated game, so the backward induction method cannot be used. Besides, in the process of infinite accumulation, the total payoff of almost all paths is infinite, so that we cannot weigh the pros and cons of different paths. In order to solve the problems above, we introduce a discount coefficient δ that discounts future earnings to the current stage. Then, the total payoff can be a finite number that can be compared. Given the discount coefficient δ and a certain path of the infinite repetitive game, if a player’s payoffs in each stage are as follows, π 1 , π 2 , π 3 …, then the total payoff of the player is:
π = π 1 + δ π 2 + δ 2 π 3 + = i = 1 δ i 1 π i .
From the equation above, it can be noted that the discount coefficient of the player reflects the player’s preference for time; the larger δ indicates that the player pays more attention to the the game gains in the latter stage. In this paper, we use δ u , δ a and δ a d to represent the discount coefficients of the user, the application and the adversary, respectively.
When k 3 > k 2 , only the mixed strategy Nash equilibrium exists, and we can use the total payoff represented above to solve the equilibrium results. We put forward a social norm, which is consistent with real situations. Generally, the user always releases its information, until it discovers information disclosure for continuous n 1 times, and then, it refuses to release. The application first chooses not to leak information and switches to leak once it finds that the adversary retrieves the information for continuous n 2 times to maximize its payoff. Additionally, the application cannot leak if the user did not release. As for the adversary, the original strategy is not to retrieve and switches to retrieve once it finds the application leaked information for continuous n 3 times. Additionally, it will switch to not retrieve once it finds that the application did not leak for n 4 times for the purpose of maximizing its payoff, as well.
Next, we want to study the players’ inner motivation of insisting on the social norm, which means that a player who chooses to deviate from the norm will gain less in the later stages. In order to describe the problem more specifically and without loss of generality, we let n 1 = 1 , n 2 = 1 , n 3 = 1 , n 4 = 2 . We claim that our analytical method is general, which can be suitable for other scenarios when n 1 , n 2 , n 3 and n 4 are under different settings.
If all of the players take the social norm above, the strategy path in the infinite repeated game will be ( 1 , 0 , 0 ) ( 1 , 0 , 0 ) ( 1 , 0 , 0 ) . Therefore, the total payoff of the user, the application and the adversary U u i ( c ) , U a i ( c ) and U a d i ( c ) can be calculated respectively as follows:
( 14 ) U u i ( c ) = Q ( c ) ( 1 + δ u + δ u 2 + δ u 3 + ) = Q ( c ) 1 δ u ( 15 ) U a i ( c ) = Q ( c ) ( 1 + δ a + δ a 2 + δ a 3 + ) = Q ( c ) 1 δ a ( 16 ) U a d i ( c ) = 0 ( 1 + δ a d + δ a d 2 + δ a d 3 + ) = 0 .
Let us consider the first case, the deviation of the application’s strategy. We reasonably assume that it starts off from the first round, so that the new strategy path will be ( 1 , 1 , 0 ) ( 1 , 1 , 1 ) ( 0 , 0 , 1 ) ( 0 , 0 , 1 ) ( 0 , 0 , 0 ) ( 0 , 0 , 0 ) .
As a result, the application’s total payoff of deviations U a i d ( c ) will be:
U a i d ( c ) = Q ( c ) + ( Q ( c ) + ( k 3 k 2 ) S e n s ( c ) ) δ a .
Then, we consider the second case, the deviation of the adversary’s strategy. Similarly, we reasonably assume that it starts off from the first round, so the new strategy path will be ( 1 , 0 , 1 ) ( 1 , 1 , 1 ) ( 0 , 0 , 1 ) ( 0 , 0 , 1 ) ( 0 , 0 , 0 ) ( 0 , 0 , 0 ) . Therefore, the adversary’s total payoff in this case U a d i d ( c ) will be:
U a d i d ( c ) = C + ( k 4 S e n s ( c ) C ) δ a d C δ a d 2 C δ a d 3 .
Finally, we consider the last case, where the application and the adversary deviate at the same time, the first round. Then, the strategy path is ( 1 , 1 , 1 ) ( 0 , 0 , 1 ) ( 0 , 0 , 1 ) ( 0 , 0 , 0 ) ( 0 , 0 , 0 ) . Therefore, the new total payoffs of the application and adversary will be:
( 19 ) U a i d ( c ) = Q ( c ) + ( k 3 k 2 ) S e n s ( 20 ) U a d i d ( c ) = C + ( k 4 S e n s ( c ) C ) δ a d C δ a d 2 .
In order to avoid the deviation of the players, the payoffs need to satisfy the following inequality:
U a i d ( c ) < U a i ( c ) U a d i d ( c ) < U a d i ( c ) U a i d ( c ) < U a i ( c ) U a d i d ( c ) < U a d i ( c )
As a consequence, when k 4 < = 3 C S e n s ( c ) , the second and last equation in (21) are constant, and we can get the discount coefficient range as follows:
δ a > ( k 3 k 2 ) S e n s ( c ) Q ( c ) + ( k 3 k 2 ) S e n s ( c ) )
While k 4 > 3 C S e n s ( c ) , the discount coefficient range is:
δ a > ( k 3 k 2 ) S e n s ( c ) Q ( c ) + ( k 3 k 2 ) S e n s ( c ) ) δ a d < k 4 S e n s ( c ) C k 4 2 S e n s ( c ) 2 4 C S e n s ( c ) 3 C 2 2 C
That is to say, when the discount coefficients satisfy the ranges, above which are related to the value of k 4 , the players will lose the motivation to actively deviate from the social norm; therefore, the context privacy of the user can be protected.

4.2. Concealing the Identity of the Application

In this section, we analyze the context privacy issue when the adversary has the capability to conceal the identity of the application. Specifically, when the adversary launches an attack on the user whose contexts have been leaked, the adversary can use some technical means to avoid the identity exposure of the application that leaked the context. Hence, the user does not know which application is the unreliable one and releases his or her contexts to the application as usual. Thus, the adversary can receive the context privacy safely. We assume that concealing the identity of the application will cost the adversary at C 2 . In this case, the strategy path will be ( 1 , 0 , 1 ) ( 1 , 1 , 1 ) C 2 ( 1 , 1 , 1 ) C 2 ( 1 , 1 , 1 ) . Therefore, the total payoff of the adversary changes into:
U a d i d ( c ) = C + ( k 4 S e n s ( c ) C C 2 ) δ a d + ( k 4 S e n s ( c ) C C 2 ) δ a d 2 + ( k 4 S e n s ( c ) C C 2 ) δ a d 3 + = C + ( k 4 S e n s ( c ) C C 2 ) δ a d 1 δ a d .
When U a d i d ( c ) < U a d i , that means δ 3 < C k 4 S e n s ( c ) C 2 ; the application will choose not to deviate from the social norm.
In summary, when considering the adversary’s action of concealing the identity of the application and k 4 < = 3 C S e n s ( c ) , the range of the players’ discount coefficient is:
δ a > ( k 3 k 2 ) S e n s ( c ) Q ( c ) + ( k 3 k 2 ) S e n s ( c ) δ a d < C k 4 S e n s ( c ) C 2
Additionally, when k 4 > 3 C S e n s ( c ) , the range of discount coefficient becomes:
δ a > ( k 3 k 2 ) S e n s ( c ) Q ( c ) + ( k 3 k 2 ) S e n s ( c ) δ a d < m i n { C k 4 S e n s ( c ) C 2 , k 4 S e n s ( c ) C k 4 2 S e n s ( c ) 2 4 C S e n s ( c ) 3 C 2 2 C }
Only if the players’ discount coefficients satisfy the ranges above can the players be sure not to actively deviate from the social norm.

5. Numerical Analysis

In this section, we conduct a numerical analysis to verify our analytical framework of the single-stage game model and the repeated one.

5.1. Numerical Analysis of the Single-Stage Game Model

When k 3 < k 2 , establishing a sound reputation mechanism for context-aware applications can preserve context privacy effectively, so there is no need to conduct the simulation for this scenario. Let us see the results in single stage game first. Actually, we have conducted extensive simulations, which depict consistent results. Due to page limitations, we only show the results when S e n s ( c ) = 0.3 , Q ( c ) = 2 , C = 1.5 . Figure 3, Figure 4, Figure 5 and Figure 6 show how the strategies and payoffs of every player change as k 1 and k 4 vary. The results show that the application’s strategies are only relevant to k 2 and k 3 , which indicates that whether the application leaks context privacy to the adversary just depends on how it weighs the credibility from the user and profits by leakage, while the user and the adversary are deeply affected by each other. The probability η of the user to release a context will decrease as k 4 increases. k 4 reflects the positive impact of retrieving c on the adversary’s payoff. Thus, increasing k 4 means the retrieving context has more positive impact on her or his payoff, which will promote retrieving and indirectly restrain the user form releasing contexts. The probability θ of the adversary to retrieve a context will decrease as k 1 increases. k 1 reflects the negative impact of the context privacy loss on the user’s payoff. Increasing k 1 means that context privacy loss has more negative impact on the user’s payoff, which will restrict release and indirectly restrict the adversary’s retrieval. As to the payoffs of the three players, when k 1 and k 4 change, their variation trend is almost changeless, because when the optimal strategies are achieved, the players’ payoffs tend to be constants, so that the players do not have motivation to adjust their strategies any more. This result reveals the meanings of the Nash equilibrium.

5.2. Numerical Analysis of the Repeated Game Model

Then, let us see the numerical analysis in the repeated game. Figure 7, Figure 8 and Figure 9 show, when k 3 > k 2 and S e n s ( c ) = 0.3 , how the strategies and payoffs of the application and the user’s payoff change as δ a and the difference between the two coefficients k 3 and k 2 change. Figure 7 shows that the application’s strategies will change from 1–0 when δ a exceeds a certain value, which depends on k 3 k 2 . Specifically, as k 3 k 2 increase, the critical value will increase, which is coincident with Equations (22) and (23). As illustrated above, k 2 is the coefficient reflecting the negative impact of selling context on the application’s credibility. Because the application’s credibility depends on the user’s impression on the application, k 2 can be controlled by the user to protect its privacy. Figure 7 reflects that when k 3 remains unchanged and k 2 is increased by the user, the application’s strategy becomes zero more easily, requiring a smaller δ a . Even though the application’s bad behavior has a small effect on its payoff in the future, it will tend to behave well, not leaking the context. From Figure 8 and Figure 9, the payoffs of the application and the user will always increase as δ a increases. Simultaneously, the two figures respectively reflect that when k 3 remains unchanged and k 2 is increased by the user, the payoffs of the user and the application increase more easily as δ a increases, requiring a smaller δ a to increase the payoffs. Even though the application’s bad behavior has a small effect on its payoff in the future, the payoffs of the user and the application still increase. Additionally, from Figure 8, when δ a is equal to the critical value, the payoff of the application to leak context and that of not doing so to will reach the same value. Furthermore, when δ a is larger than the critical value, the payoff of not leaking contexts will be larger than the payoff of leakage, that is to say, letting δ a be larger than the critical value is the condition of the application not deviating from the social norm.
Figure 10, Figure 11 and Figure 12 show, when k 3 > k 2 and S e n s ( c ) = 0.3 , how the strategies and payoffs of adversary and user’s payoff change as δ a d and k 4 change. The results show that the adversary’s strategies will change from 1–0 when δ a d is less than a certain value, which depends on k 4 . Specifically as k 4 increases, the critical value will decrease, which is coincident with Equation (22). Besides, Figure 11 shows that the payoffs of the adversary when he or she does not take the initiative to retrieve contexts will be more than those when he or she does. Therefore, the condition of the adversary in not deviating from the social norm is that δ a d is smaller than a critical value. In this case, the payoffs of the user will also increase, as shown in Figure 12.
In the single-stage game model, the players’ strategies are directly related to some coefficients in their payoff functions, such as the coefficient reflecting the negative impact of the context privacy loss on the user’s payoff k 1 and the coefficient reflecting the positive impact of retrieving context on the adversary’s payoff k 4 , while in the repeated game model, the players’ strategies are more affected by the discount factors, illustrating the influence of their current strategies on their payoffs in the future. Additionally, the coefficients k 1 , k 2 , k 3 and k 4 affect the trend of the players’ strategies indirectly. In other words, they affect the players’ strategies and payoffs by deciding the critical value of the discount factors.

6. Conclusions

This paper studies the issue of context privacy preservation about the context-aware application. Considering that the mobile phone user, context-aware application and malicious adversary in the context sensing system all can adjust their strategies to maximize their payoffs in the real world, we use game theory to formulate the decision-making process of the three players. Specifically, we use the extensive form game to describe their single interaction and construct their payoff functions. Then, we obtain the optimal solution by calculating the Nash equilibriums of the game. After that, we analyze the equilibrium result from the respective repeated game and then put forward a social norm that can preserve privacy, as well as calculate the condition of three players complying with the social norm. The numerical analysis indicates how the players’ strategies and payoffs change when relevant parameters change. We can draw the conclusion that the reputation mechanism for the context-aware application and the player’s preference for time are crucial, the first of which has a great effect on the application’s strategy in the one-round interaction and the second of which will influence the strategy of the application and the adversary greatly in multiple interactions. If the reputation mechanism can be designed properly, the application will be motivated to protect the user’s privacy when maximizing its payoffs. Then, the adversary does not have the chance to retrieve the context privacy, and the user has complete trust in the application, which accords with the requirement of mobile applications’ development; while in multiple interactions, players will consider the payoffs in the future. If the players’ preference for time is in a reasonable specific range, the fear of being punished in the future will effectively prevent the action of privacy leakage.

Acknowledgments

This work has been supported by the National Natural Science Foundation of China (No. 61472044, No. 61272475, No. 61571049, No.61401029), the Fundamental Research Funds for the Central Universities (No. 2014KJJCB32) and the Beijing Advanced Innovation Center for Future Education (BJAICFE2016IR-004).

Author Contributions

S.W conceived and designed the study; L.L wrote the whole paper; W.S. performed the experiments; J.G. and R.B. analyzed the data; K.L. revised the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Götz, M.; Nath, S.; Gehrke, J. Maskit: Privately releasing user context streams for personalized mobile applications. In Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, Scottsdale, AZ, USA, 20–24 May 2012; pp. 289–300.
  2. Wang, W.; Zhang, Q. A stochastic game for privacy preserving context sensing on mobile phone. In Proceedings of the IEEE INFOCOM 2014—IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014; pp. 2328–2336.
  3. Duan, Z.; Yan, M.; Cai, Z.; Wang, X.; Han, M.; Li, Y. Truthful Incentive Mechanisms for Social Cost Minimization in Mobile Crowdsourcing Systems. Sensors 2016, 16, 481. [Google Scholar] [CrossRef] [PubMed]
  4. Yang, P.; Cao, Z.; Dong, X.; Zia, T.A. An efficient privacy preserving data aggregation scheme with constant communication overheads for wireless sensor networks. IEEE Commun. Lett. 2011, 15, 1205–1207. [Google Scholar] [CrossRef]
  5. Wang, Y.; Cai, Z.; Yin, G.; Gao, Y.; Tong, X.; Wu, G. An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput. Netw. 2016, 102, 157–171. [Google Scholar] [CrossRef]
  6. Zhang, L.; Cai, Z.; Wang, X. FakeMask: A Novel Privacy Preserving Approach for Smartphones. IEEE Trans. Netw. Serv. Manag. 2016, 13, 335–348. [Google Scholar] [CrossRef]
  7. Groat, M.M.; He, W.; Forrest, S. KIPDA: K-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the 2011 Proceedings IEEE INFOCOM, Shanghai, China, 10–15 April 2011; pp. 2024–2032.
  8. Shin, M.; Cornelius, C.; Peebles, D.; Kapadia, A.; Kotz, D.; Triandopoulos, N. AnonySense: A system for anonymous opportunistic sensing. Pervasive Mob. Comput. 2011, 7, 16–30. [Google Scholar] [CrossRef]
  9. Vu, K.; Zheng, R.; Gao, L. Efficient algorithms for k-anonymous location privacy in participatory sensing. In Proceedings of the 2012 Proceedings IEEE INFOCOM, Orlando, FL, USA, 25–30 March 2012; pp. 2399–2407.
  10. Westhoff, D.; Girao, J.; Acharya, M. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation. IEEE Trans. Mob. Comput. 2006, 5, 1417–1431. [Google Scholar] [CrossRef]
  11. Narayanan, A.; Thiagarajan, N.; Lakhani, M.; Hamburg, M.; Boneh, D. Location Privacy via Private Proximity Testing. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA, 6–9 February 2011.
  12. Zhuang, J.; Bier, V.M. Balancing Terrorism and Natural Disasters—Defensive Strategy with Endogenous Attacker Effort. Oper. Res. 2007, 55, 976–991. [Google Scholar] [CrossRef]
  13. Kesete, Y.; Peng, J.; Gao, Y.; Shan, X.; Davidson, R.A.; Nozick, L.K.; Kruse, J. Modeling insurer-homeowner interactions in managing natural disaster risk. Risk Anal. 2014, 34, 1040–1055. [Google Scholar] [CrossRef] [PubMed]
  14. Peng, J.; Shan, X.G.; Gao, Y.; Kesete, Y.; Davidson, R.A.; Nozick, L.K.; Kruse, J. Modeling the integrated roles of insurance and retrofit in managing natural disaster risk: A multi-stakeholder perspective. Nat. Hazards 2014, 74, 1043–1068. [Google Scholar] [CrossRef]
  15. Shan, X.; Zhuang, J. Subsidizing to disrupt a terrorism supply chain: A four-player game. J. Oper. Res. Soc. 2014, 65, 1108–1119. [Google Scholar] [CrossRef]
  16. Shiyu, X. Economic Game Theory; Fudan University Publishing House: Shanghai, China, 2002; pp. 245–263. [Google Scholar]
Figure 1. The context sensing system.
Figure 1. The context sensing system.
Sensors 17 00339 g001
Figure 2. The game tree of context privacy protection.
Figure 2. The game tree of context privacy protection.
Sensors 17 00339 g002
Figure 3. Impact of k 1 on strategies.
Figure 3. Impact of k 1 on strategies.
Sensors 17 00339 g003
Figure 4. Impact of k 1 on payoffs.
Figure 4. Impact of k 1 on payoffs.
Sensors 17 00339 g004
Figure 5. Impact of k 4 on strategies.
Figure 5. Impact of k 4 on strategies.
Sensors 17 00339 g005
Figure 6. Impact of k 4 on payoffs.
Figure 6. Impact of k 4 on payoffs.
Sensors 17 00339 g006
Figure 7. Impact of k 3 k 2 and δ a on the application’s strategies.
Figure 7. Impact of k 3 k 2 and δ a on the application’s strategies.
Sensors 17 00339 g007
Figure 8. Impact of k 3 k 2 and δ a on the application’s payoffs.
Figure 8. Impact of k 3 k 2 and δ a on the application’s payoffs.
Sensors 17 00339 g008
Figure 9. Impact of k 3 k 2 and δ a on the user’s payoffs.
Figure 9. Impact of k 3 k 2 and δ a on the user’s payoffs.
Sensors 17 00339 g009
Figure 10. Impact of k 4 and δ a d on the adversary’s strategies.
Figure 10. Impact of k 4 and δ a d on the adversary’s strategies.
Sensors 17 00339 g010
Figure 11. Impact of k 4 and δ a d on the adversary’s payoffs.
Figure 11. Impact of k 4 and δ a d on the adversary’s payoffs.
Sensors 17 00339 g011
Figure 12. Impact of k 4 and δ a d on the user’s payoffs.
Figure 12. Impact of k 4 and δ a d on the user’s payoffs.
Sensors 17 00339 g012
Table 1. The payoff of the players in different plays.
Table 1. The payoff of the players in different plays.
Play ω 1 = ( α 1 , β 1 , γ 1 ) ω 2 = ( α 1 , β 1 , γ 2 ) ω 3 = ( α 1 , β 2 , γ 1 ) ω 4 = ( α 1 , β 2 , γ 2 ) ω 5 = ( α 2 , β 2 , γ 1 ) ω 6 = ( α 2 , β 2 , γ 2 )
Payoff
h u ( ω i ) Q ( c ) k 1 S e n s ( c ) Q ( c ) Q ( c ) Q ( c ) 00
h a ( ω i ) Q ( c ) + ( k 3 k 2 ) S e n s ( c ) Q ( c ) Q ( c ) Q ( c ) 00
h a d ( ω i ) C + k 4 S e n s ( c ) 0 C 0 C 0

Share and Cite

MDPI and ACS Style

Wang, S.; Li, L.; Sun, W.; Guo, J.; Bie, R.; Lin, K. Context Sensing System Analysis for Privacy Preservation Based on Game Theory. Sensors 2017, 17, 339. https://doi.org/10.3390/s17020339

AMA Style

Wang S, Li L, Sun W, Guo J, Bie R, Lin K. Context Sensing System Analysis for Privacy Preservation Based on Game Theory. Sensors. 2017; 17(2):339. https://doi.org/10.3390/s17020339

Chicago/Turabian Style

Wang, Shengling, Luyun Li, Weiman Sun, Junqi Guo, Rongfang Bie, and Kai Lin. 2017. "Context Sensing System Analysis for Privacy Preservation Based on Game Theory" Sensors 17, no. 2: 339. https://doi.org/10.3390/s17020339

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop