Game Theoretic Analysis of Multiparty Access Control in Online Social Networks

被引:36
作者
Hu, Hongxin [1 ]
Ahn, Gail-Joon [2 ]
Zhao, Ziming [2 ]
Yang, Dejun [3 ]
机构
[1] Clemson Univ, Clemson, SC 29634 USA
[2] Arizona State Univ, Tempe, AZ 85287 USA
[3] Colorado Sch Mines, Golden, CO 80401 USA
来源
PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14) | 2014年
基金
美国国家科学基金会;
关键词
Multiparty Access Control; Social Networks; Game Theory;
D O I
10.1145/2613087.2613097
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Existing online social networks (OSNs) only allow a single user to restrict access to her/his data but cannot provide any mechanism to enforce privacy concerns over data associated with multiple users. This situation leaves privacy conflicts largely unresolved and leads to the potential disclosure of users' sensitive information. To address such an issue, a MultiParty Access Control (MPAC) model was recently proposed, including a systematic approach to identify and resolve privacy conflicts for collaborative data sharing in OSNs. In this paper, we take another step to further study the problem of analyzing the strategic behavior of rational controllers in multiparty access control, where each controller aims to maximize her/his own benefit by adjusting her/his privacy setting in collaborative data sharing in OSNs. We first formulate this problem as a multiparty control game and show the existence of unique Nash Equilibrium (NE) which is critical because at an NE, no controller has any incentive to change her/his privacy setting. We then present algorithms to compute the NE and prove that the system can converge to the NE in only a few iterations. A numerical analysis is also provided for different scenarios that illustrate the interplay of controllers in the multiparty control game. In addition, we conduct user studies of the multiparty control game to explore the gap between game theoretic approaches and real human behaviors.
引用
收藏
页码:93 / 102
页数:10
相关论文
共 35 条
[1]  
Alpcan T., 2010, Network Security: A Decision and Game-Theoretic Approach
[2]  
[Anonymous], 2013, ACM Comput. Surv., DOI [10.1145/2480741.2480742, DOI 10.1145/2480741.2480742]
[3]  
[Anonymous], 2011, P ACM CODASPY
[4]  
[Anonymous], 2011, COMPUTERWORLD
[5]  
[Anonymous], 2010, P 5 ACM S INF COMP C
[6]  
[Anonymous], 2007, P WORKSH WEB 2 0 SEC
[7]  
[Anonymous], 2011, STATE SOCIAL MEDIA 2
[8]  
[Anonymous], 2004, INTRO GAME THEORY
[9]  
Becker J., P 2009 WORKSH WEB, V2
[10]  
Besmer A, 2010, CHI2010: PROCEEDINGS OF THE 28TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P1563