Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract

被引:0
|
作者
Croft, N. J. [1 ]
Olivier, M. S. [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, ICSA Res Grp, Pretoria, South Africa
关键词
Privacy; Location Privacy; Game Theory; Utility;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In certain circumstances an individual may not be in control of their private location information and thus vulnerable to a privacy violation. In this paper, we ensure location privacy through the establishment of a prohibitive contract in a situation where an individual wishes to minimize privacy loss and a service provider aims to maximize profits. Given the possible strategies we show that a privacy equilibrium can be found. This equilibrium, expressed in the form of a prohibitive contract, is established with the intention of preventing a possible privacy violation. Should within the constraints of the prohibitive contract, a violation occur, a suitable and efficient outcome for both parties presents itself. We further investigate how such violations may affect a user-centric location privacy system. Emphasis is placed on the economic and contract aspects of the parties' relationship, rather than specific technical detail of location privacy. Utilizing the utilitarian paradigm approach, we evaluate the overall efficiency of the prohibitive contracts which we show postulates convergence towards an overall balanced system.
引用
收藏
页码:19 / 30
页数:12
相关论文
共 50 条
  • [21] PrivSem: Protecting location privacy using semantic and differential privacy
    Li, Yanhui
    Cao, Xin
    Yuan, Ye
    Wang, Guoren
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2019, 22 (06): : 2407 - 2436
  • [22] PrivSem: Protecting location privacy using semantic and differential privacy
    Yanhui Li
    Xin Cao
    Ye Yuan
    Guoren Wang
    World Wide Web, 2019, 22 : 2407 - 2436
  • [23] Location Privacy for Mobile Crowd Sensing through Population Mapping
    Shin, Minho
    Cornelius, Cory
    Kapadia, Apu
    Triandopoulos, Nikos
    Kotz, David
    SENSORS, 2015, 15 (07): : 15285 - 15310
  • [24] Preserving Location Privacy in UASN through Collaboration and Semantic Encapsulation
    Wang, Yuhang
    Tian, Zhihong
    Sun, Yanbin
    Du, Xiaojiang
    Guizani, Nadra
    IEEE NETWORK, 2020, 34 (04): : 284 - 290
  • [25] PGLP: Customizable and Rigorous Location Privacy Through Policy Graph
    Cao, Yang
    Xiao, Yonghui
    Takagi, Shun
    Xiong, Li
    Yoshikawa, Masatoshi
    Shen, Yilin
    Liu, Jinfei
    Jin, Hongxia
    Xu, Xiaofeng
    COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 : 655 - 676
  • [26] Privacy, property rights and efficiency: The economics of privacy as secrecy
    Benjamin E. Hermalin
    Michael L. Katz
    Quantitative Marketing and Economics, 2006, 4 : 209 - 239
  • [27] Breaching the Contract? Privacy and the UK Census
    Heeney, Catherine
    INFORMATION SOCIETY, 2012, 28 (05) : 316 - 328
  • [28] Protecting location privacy and query privacy: a combined clustering approach
    Lin, Chi
    Wu, Guowei
    Yu, Chang Wu
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12) : 3021 - 3043
  • [29] Privacy, property rights and efficiency: The economics of privacy as secrecy
    Hermalin, Benjamin E.
    Katz, Michael L.
    QME-QUANTITATIVE MARKETING AND ECONOMICS, 2006, 4 (03): : 209 - 239
  • [30] Privacy Enhancing Technology through a Privacy Wallet
    Kramer, Frank
    Jaeger, Oliver
    Thalheim, Bernhard
    INFORMATION MODELLING AND KNOWLEDGE BASES XXVII, 2016, 280 : 137 - 156