Modelling the relationship between trust and privacy in network environments

被引:0
|
作者
Gao, Feng [1 ]
He, Jingsha [2 ]
Ma, Shunan [3 ]
机构
[1] Beijing Univ Technol, Coll Comp Sci & Technol, Sch Comp Sci & Technol, Beijing 100124, Peoples R China
[2] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
[3] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
关键词
privacy; trust; game theory;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In network environments, the entities that connect to or interact with each other may know very little about each other or without prior knowledge at the beginning of an interaction. Therefore, in many cases, before a serious interaction begins, trust must be established between the interactive entities. During trust establishment, an entity may require the other entity to provide some information that could contain some privacy about the entity, leading to privacy loss. On the other hand, such information exchange can help establish trust between the interactive entities. Consequently, it is important to understand the relationship between trust and privacy. In this paper, we study the relationship between trust and privacy in network environments based on game theory in which we consider the facticity of the information that the entities exchanged. Through some application scenarios, we show how our model can be applied in network interactions between entities.
引用
收藏
页码:347 / 354
页数:8
相关论文
共 50 条
  • [31] A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy
    Lu, Zhaojun
    Qu, Gang
    Liu, Zhenglin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (02) : 760 - 776
  • [32] Trust production and privacy concerns on the Internet - A framework based on relationship marketing and social exchange theory
    Luo, XM
    INDUSTRIAL MARKETING MANAGEMENT, 2002, 31 (02) : 111 - 118
  • [33] An identity privacy enhanced trust model in fully distributed virtual computing environments
    Wei, Yunzhao
    He, Yanxing
    Hao, Liming
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 704 - +
  • [34] Preserving privacy in mobile environments with Virtual Network Stacks
    Matos, Alfredo
    Girao, Joao
    Sargento, Susana
    Aguiar, Rui
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 1971 - +
  • [35] Exploring the relationship between context and privacy
    Heiber, T
    Marrón, PJ
    PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 35 - 48
  • [36] Revealing the relationship between rational fatalism and the online privacy paradox
    Xie, Wenjing
    Fowler-Dawson, Amy
    Tvauri, Anita
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2019, 38 (07) : 742 - 759
  • [37] ON THE COMPLEX RELATIONSHIP BETWEEN LAWAND TRUST
    Roig, Francisco Javier Ansuategui
    DERECHOS Y LIBERTADES, 2023, (48) : 71 - 87
  • [38] Cryptography, Trust and Privacy: It's Complicated
    Balsa, Ero
    Nissenbaum, Helen
    Park, Sunoo
    PROCEEDINGS OF THE 2022 SYMPOSIUM ON COMPUTER SCIENCE AND LAW, CSLAW 2022, 2022, : 167 - 179
  • [39] A Vision for Trust, Security and Privacy of Blockchain
    Wang, Wenshi
    SMART BLOCKCHAIN, 2018, 11373 : 93 - 98
  • [40] Trust, privacy and security in digital business
    Katsikas, SK
    Lopez, J
    Pernul, G
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (06): : 391 - 399