Location Privacy: Privacy, Efficiency and Recourse through a Prohibitive Contract

被引:0
|
作者
Croft, N. J. [1 ]
Olivier, M. S. [1 ]
机构
[1] Univ Pretoria, Dept Comp Sci, ICSA Res Grp, Pretoria, South Africa
关键词
Privacy; Location Privacy; Game Theory; Utility;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In certain circumstances an individual may not be in control of their private location information and thus vulnerable to a privacy violation. In this paper, we ensure location privacy through the establishment of a prohibitive contract in a situation where an individual wishes to minimize privacy loss and a service provider aims to maximize profits. Given the possible strategies we show that a privacy equilibrium can be found. This equilibrium, expressed in the form of a prohibitive contract, is established with the intention of preventing a possible privacy violation. Should within the constraints of the prohibitive contract, a violation occur, a suitable and efficient outcome for both parties presents itself. We further investigate how such violations may affect a user-centric location privacy system. Emphasis is placed on the economic and contract aspects of the parties' relationship, rather than specific technical detail of location privacy. Utilizing the utilitarian paradigm approach, we evaluate the overall efficiency of the prohibitive contracts which we show postulates convergence towards an overall balanced system.
引用
收藏
页码:19 / 30
页数:12
相关论文
共 50 条
  • [41] A survey of computational location privacy
    John Krumm
    Personal and Ubiquitous Computing, 2009, 13 : 391 - 399
  • [42] On Location Privacy in LTE Networks
    Roth, John D.
    Tummala, Murali
    McEachen, John C.
    Scrofani, James W.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (06) : 1358 - 1368
  • [43] Geosurveillance, Location Privacy, and Personalization
    Banerjee, Syagnik
    JOURNAL OF PUBLIC POLICY & MARKETING, 2019, 38 (04) : 484 - 499
  • [44] Balancing Authentication and Location Privacy in Cooperative Authentication
    Liu Licai
    Guo Yunchuan
    Yin Lihua
    Sun Yan
    2013 ACM/IEEE SYMPOSIUM ON ARCHITECTURES FOR NETWORKING AND COMMUNICATIONS SYSTEMS (ANCS), 2013, : 107 - +
  • [45] Uniform Obfuscation for Location Privacy
    Dini, Gianluca
    Perazzo, Pericle
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 90 - 105
  • [46] An Evaluation Framework for Location Privacy
    Martinez-Bea, Sergi
    Torra, Vicenc
    ARTIFICIAL INTELLIGENCE RESEARCH AND DEVELOPMENT, 2011, 232 : 140 - 148
  • [47] Location Privacy in the Wake of the GDPR
    Georgiadou, Yola
    de By, Rolf A.
    Kounadi, Ourania
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2019, 8 (03)
  • [48] Semantics-aware location privacy preserving: A differential privacy approach
    Zou, Dikai
    Tao, Jun
    Wang, Zuyan
    COMPUTERS & SECURITY, 2025, 154
  • [49] ESOT: a new privacy model for preserving location privacy in Internet of Things
    Ullah, Ikram
    Shah, Munam Ali
    Wahid, Abdul
    Mehmood, Amjad
    Song, Houbing
    TELECOMMUNICATION SYSTEMS, 2018, 67 (04) : 553 - 575
  • [50] ESOT: a new privacy model for preserving location privacy in Internet of Things
    Ikram Ullah
    Munam Ali Shah
    Abdul Wahid
    Amjad Mehmood
    Houbing Song
    Telecommunication Systems, 2018, 67 : 553 - 575