Visible to the public Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach

TitleTowards Privacy-Aware Collaborative Security: A Game-Theoretic Approach
Publication TypeConference Paper
Year of Publication2017
AuthorsJin, R., He, X., Dai, H., Dutta, R., Ning, P.
Conference Name2017 IEEE Symposium on Privacy-Aware Computing (PAC)
Keywordsanticipated information exchange, attack prevention, Byzantine entities, Collaboration, collaborative entities, collaborative security, collaborative security schemes, Computer crime, Computing Theory, data privacy, Electronic mail, game theory, game-theoretic approach, Games, Heuristic algorithms, individual security systems, optimal collaboration strategies, predictability, privacy, privacy-aware collaborative security, privacy-sensitive entities, pubcrawl, Resiliency, Scalability, security entities, Security Heuristics, security of data, sophisticated attack techniques, specific security actions, two-layer single-leader multifollower game, utility-privacy tradeoff curve
Abstract

With the rapid development of sophisticated attack techniques, individual security systems that base all of their decisions and actions of attack prevention and response on their own observations and knowledge become incompetent. To cope with this problem, collaborative security in which a set of security entities are coordinated to perform specific security actions is proposed in literature. In collaborative security schemes, multiple entities collaborate with each other by sharing threat evidence or analytics to make more effective decisions. Nevertheless, the anticipated information exchange raises privacy concerns, especially for those privacy-sensitive entities. In order to obtain a quantitative understanding of the fundamental tradeoff between the effectiveness of collaboration and the entities' privacy, a repeated two-layer single-leader multi-follower game is proposed in this work. Based on our game-theoretic analysis, the expected behaviors of both the attacker and the security entities are derived and the utility-privacy tradeoff curve is obtained. In addition, the existence of Nash equilibrium (NE) for the collaborative entities is proven, and an asynchronous dynamic update algorithm is proposed to compute the optimal collaboration strategies of the entities. Furthermore, the existence of Byzantine entities is considered and its influence is investigated. Finally, simulation results are presented to validate the analysis.

URLhttps://ieeexplore.ieee.org/document/8166617
DOI10.1109/PAC.2017.32
Citation Keyjin_towards_2017