Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach
Title | Towards Privacy-Aware Collaborative Security: A Game-Theoretic Approach |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Jin, R., He, X., Dai, H., Dutta, R., Ning, P. |
Conference Name | 2017 IEEE Symposium on Privacy-Aware Computing (PAC) |
Keywords | anticipated information exchange, attack prevention, Byzantine entities, Collaboration, collaborative entities, collaborative security, collaborative security schemes, Computer crime, Computing Theory, data privacy, Electronic mail, game theory, game-theoretic approach, Games, Heuristic algorithms, individual security systems, optimal collaboration strategies, predictability, privacy, privacy-aware collaborative security, privacy-sensitive entities, pubcrawl, Resiliency, Scalability, security entities, Security Heuristics, security of data, sophisticated attack techniques, specific security actions, two-layer single-leader multifollower game, utility-privacy tradeoff curve |
Abstract | With the rapid development of sophisticated attack techniques, individual security systems that base all of their decisions and actions of attack prevention and response on their own observations and knowledge become incompetent. To cope with this problem, collaborative security in which a set of security entities are coordinated to perform specific security actions is proposed in literature. In collaborative security schemes, multiple entities collaborate with each other by sharing threat evidence or analytics to make more effective decisions. Nevertheless, the anticipated information exchange raises privacy concerns, especially for those privacy-sensitive entities. In order to obtain a quantitative understanding of the fundamental tradeoff between the effectiveness of collaboration and the entities' privacy, a repeated two-layer single-leader multi-follower game is proposed in this work. Based on our game-theoretic analysis, the expected behaviors of both the attacker and the security entities are derived and the utility-privacy tradeoff curve is obtained. In addition, the existence of Nash equilibrium (NE) for the collaborative entities is proven, and an asynchronous dynamic update algorithm is proposed to compute the optimal collaboration strategies of the entities. Furthermore, the existence of Byzantine entities is considered and its influence is investigated. Finally, simulation results are presented to validate the analysis. |
URL | https://ieeexplore.ieee.org/document/8166617 |
DOI | 10.1109/PAC.2017.32 |
Citation Key | jin_towards_2017 |
- individual security systems
- utility-privacy tradeoff curve
- two-layer single-leader multifollower game
- specific security actions
- sophisticated attack techniques
- security of data
- Security Heuristics
- security entities
- Scalability
- Resiliency
- pubcrawl
- privacy-sensitive entities
- privacy-aware collaborative security
- privacy
- predictability
- optimal collaboration strategies
- anticipated information exchange
- Heuristic algorithms
- Games
- game-theoretic approach
- game theory
- Electronic mail
- data privacy
- Computing Theory
- Computer crime
- collaborative security schemes
- collaborative security
- collaborative entities
- collaboration
- Byzantine entities
- attack prevention