| Literature DB >> 28208593 |
Shengling Wang1, Luyun Li2, Weiman Sun3, Junqi Guo4, Rongfang Bie5, Kai Lin6.
Abstract
In a context sensing system in which a sensor-equipped mobile phone runs an unreliable context-aware application, the application can infer the user's contexts, based on which it provides personalized services. However, the application may sell the user's contexts to some malicious adversaries to earn extra profits, which will hinder its widespread use. In the real world, the actions of the user, the application and the adversary in the context sensing system affect each other, so that their payoffs are constrained mutually. To figure out under which conditions they behave well (the user releases, the application does not leak and the adversary does not retrieve the context), we take advantage of game theory to analyze the context sensing system. We use the extensive form game and the repeated game, respectively, to analyze two typical scenarios, single interaction and multiple interaction among three players, from which Nash equilibriums and cooperation conditions are obtained. Our results show that the reputation mechanism for the context-sensing system in the former scenario is crucial to privacy preservation, so is the extent to which the participants are concerned about future payoffs in the latter one.Entities:
Keywords: context-aware; game theory; mobile application; privacy protection
Year: 2017 PMID: 28208593 PMCID: PMC5336003 DOI: 10.3390/s17020339
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1The context sensing system.
Figure 2The game tree of context privacy protection.
The payoff of the players in different plays.
| Play | |||||||
|---|---|---|---|---|---|---|---|
| Payoff | |||||||
| 0 | 0 | ||||||
| 0 | 0 | ||||||
| 0 | 0 | 0 | |||||
Figure 3Impact of on strategies.
Figure 4Impact of on payoffs.
Figure 5Impact of on strategies.
Figure 6Impact of on payoffs.
Figure 7Impact of and on the application’s strategies.
Figure 8Impact of and on the application’s payoffs.
Figure 9Impact of and on the user’s payoffs.
Figure 10Impact of and on the adversary’s strategies.
Figure 11Impact of and on the adversary’s payoffs.
Figure 12Impact of and on the user’s payoffs.