On the Tradeoff between Privacy and Utility in Collaborative Security-A Game Theoretical Approach
نویسندگان
چکیده
With the rapid development of sophisticated attack techniques, individual security systems which base all of their decisions and actions of attack prevention and response on their own observations and knowledge become incompetent. To cope with this problem, collaborative security that coordinates security entities to perform specific security actions is proposed and developed in literature. In collaborative security schemes, multiple entities collaborate with each other by sharing some security evidence or analysis results so as to make more effective and reasonable decisions. Nevertheless, the information exchange raises privacy concerns, especially for those privacy-sensitive entities. In order to obtain a quantitative understanding of the fundamental tradeoff between the effectiveness of collaboration and the entities’ privacy, a repeated two-layer single-leader multifollower game is proposed in this work. Based on our gametheoretic analysis, the expected behaviors of both the attacker and the security entities are derived and the utility-privacy tradeoff curve is obtained. In addition, the existence of Nash equilibrium (NE) is proved and an asynchronous dynamic update algorithm is proposed to compute the optimal collaboration strategies of the entities. Furthermore, the existence of Byzantine entities is considered and its influence is investigated. Finally, simulation results are shown to validate the analysis.
منابع مشابه
A Game Theoretical Approach to Optimize Policies of Government Under the Cartel of Two Green and Non-green Supply Chains
In this research, firms aim at maximizing two purposes of social welfare (environment) and profitability in the supply chain system. It is assumed that there are two supply chains, a green and an ordinary, each consists of a manufacturer and a supplier; in which the manufacturer generates profit through franchises. The green and the ordinary manufacturers form a cartel on the market of a certai...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کاملTradeoff Negotiation: The Importance of Getting in the Game; Comment on “Swiss-CHAT: Citizens Discuss Priorities for Swiss Health Insurance Coverage”
Swiss-CHAT’s playful approach to public rationing can be considered in terms of deliberative process design as well as in terms of health policy. The process’ forced negotiation of trade-offs exposed unexamined driving questions, and challenged prevalent presumptions about health care demand and about conditions of public reasoning that enable transparent rationing. While the experiment provide...
متن کاملEnabling collaborative network security with privacy-preserving data aggregation
Today, there is a fundamental imbalance in cybersecurity. While attackers act more and more globally and coordinated, e.g., by using botnets, their counterparts trying to manage and defend networks are limited to examine local information only. Collaboration across network boundaries would substantially strengthen network defense by enabling collaborative intrusion and anomaly detection. Also, ...
متن کاملThesis Proposal: New Algorithms for Preserving Differential Privacy
In this thesis, we will consider the problem of how one should perform computations on private data. We will specifically consider algorithms which preserve the recent formalization of privacy known as differential privacy. The fundamental tradeoff that we consider is that of privacy and utility. For which tasks can we perform useful computations while still preserving privacy, and what exactly...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017