The (Co-)Location Sharing Game

Open access

Abstract

Most popular location-based social networks, such as Facebook and Foursquare, let their (mobile) users post location and co-location (involving other users) information. Such posts bring social benefits to the users who post them but also to their friends who view them. Yet, they also represent a severe threat to the users’ privacy, as co-location information introduces interdependences between users. We propose the first game-theoretic framework for analyzing the strategic behaviors, in terms of information sharing, of users of OSNs. To design parametric utility functions that are representative of the users’ actual preferences, we also conduct a survey of 250 Facebook users and use conjoint analysis to quantify the users’ benefits o f sharing vs. viewing (co)-location information and their preference for privacy vs. benefits. Our survey findings expose the fact that, among the users, there is a large variation, in terms of these preferences. We extensively evaluate our framework through data-driven numerical simulations. We study how users’ individual preferences influence each other’s decisions, we identify several factors that significantly affect these decisions (among which, the mobility data of the users), and we determine situations where dangerous patterns can emerge (e.g., a vicious circle of sharing, or an incentive to over-share) – even when the users share similar preferences.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] A. Acquisti. Privacy in electronic commerce and the economics of immediate gratification. In Proceedings of the 5th ACM conference on Electronic commerce pages 21–29. ACM 2004.

  • [2] A. Acquisti. Nudging privacy: The behavioral economics of personal information. IEEE Security Privacy 2009.

  • [3] A. Acquisti and J. Grossklags. Privacy Attitudes and Privacy Behavior. 2004.

  • [4] A. Acquisti and J. Grossklags. Privacy and rationality in individual decision making. IEEE Security Privacy 3(1) 2005.

  • [5] M. Backes M. Humbert J. Pang and Y. Zhang. walk2friends: Inferring social links from mobility profiles. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security pages 1943–1957. ACM 2017.

  • [6] L. Backstrom E. Sun and C. Marlow. Find me if you can: improving geographical prediction with social and spatial proximity. In WWW 2010.

  • [7] F. Benevenuto T. Rodrigues M. Cha and V. Almeida. Characterizing user behavior in online social networks. In IMC 2009.

  • [8] P. Berrang M. Humbert Y. Zhang I. Lehmann R. Eils and M. Backes. Dissecting privacy risks in biomedical data. In Proceedings of the 3rd IEEE European Symposium on Security and Privacy (Euro S&P). IEEE 2018.

  • [9] A. Besmer and H. Richter Lipford. Moving beyond untagging: photo privacy in a tagged world. In Proc. of SIGCHI. ACM 2010.

  • [10] G. Biczók and P. H. Chia. Interdependent Privacy: Let Me Share Your Data. In FC 2013.

  • [11] I. Bilogrevic K. Huguenin B. Ağır M. Jadliwala M. Gazaki and J.-P. Hubaux. A Machine-Learning Based Approach to Privacy-Aware Information-Sharing in Mobile Social Networks. Pervasive and Mobile Computing (PMC) Nov. 2015.

  • [12] A. Chaabane G. Acs and M. Kaafar. You are what you like# information leakage through users’ interests. In NDSS 2012.

  • [13] J. Chen J. W. Ping Y. C. Xu and B. C. Tan. Information privacy concern about peer disclosure in online social networks. IEEE Transactions on Engineering Management 62(3):311–324 2015.

  • [14] H. Cho and A. Filippova. Networked privacy management in Facebook: A mixed-methods and multinational study. In Proc. of CSCW. ACM 2016.

  • [15] D. Crandall L. Backstrom D. Cosley S. Suri D. Huttenlocher and J. Kleinberg. Inferring social ties from geographic coincidences. Proc. of PNAS 107 2010.

  • [16] R. Dey C. Tang K. Ross and N. Saxena. Estimating age privacy leakage in online social networks. In INFOCOM 2012.

  • [17] R. L. Fogues P. K. Murukannaiah J. M. Such and M. P. Singh. Sharing policies in multiuser privacy scenarios: Incorporating context preferences and arguments in decision making. ACM Transactions on Computer-Human Interaction (TOCHI) 24(1):5 2017.

  • [18] D. Fudenberg and J. Tirole. Game theory. MIT press 1991.

  • [19] L. González-Manzano A. I. González-Tablas J. M. de Fuentes and A. Ribagorda. Cooped: Co-owned personal data management. Computers & Security 47 2014.

  • [20] P. E. Green and V. Srinivasan. Conjoint Analysis in Consumer Research: Issues and Outlook. Journal of Consumer Research 5(2) 1978.

  • [21] B. Henne C. Szongott and M. Smith. Snapme if you can: Privacy threats of other peoples’ geo-tagged media and what we can do about it. In WiSec 2013.

  • [22] M. Humbert E. Ayday J.-P. Hubaux and A. Telenti. Addressing the Concerns of the Lacks Family: Quantification of Kin Genomic Privacy. In CCS’13: Proc. of the 20th ACM Conf. on Computer and Communications Security 2013.

  • [23] M. Humbert E. Ayday J.-P. Hubaux and A. Telenti. On non-cooperative genomic privacy. In FC 2015.

  • [24] P. Ilia I. Polakis E. Athanasopoulos F. Maggi and S. Ioannidis. Face/Off: Preventing Privacy Leakage From Photos in Social Networks. In CCS 2015.

  • [25] H. Jia and H. Xu. Autonomous and interdependent: Collaborative privacy management on social networking sites. In Proc. of CHI. ACM 2016.

  • [26] S. Kokolakis. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers Security 2015.

  • [27] D. Koller and N. Friedman. Probabilistic graphical models: principles and techniques. 2009.

  • [28] D. Koller and B. Milch. Multi-agent influence diagrams for representing and solving games. Games and economic behavior 45(1) 2003.

  • [29] H. Krasnova S. Spiekermann K. Koroleva and T. Hildebrand. Online social networks: Why we disclose. Journal of information technology 25(2) 2010.

  • [30] J. Krumm. A survey of computational location privacy. Personal and Ubiquitous Computing 13(6) 2009.

  • [31] A. Lampinen V. Lehtinen A. Lehmuskallio and S. Tamminen. We’re in it together: interpersonal management of disclosure in social network services. In Proc. of CHI 2011.

  • [32] A. Laszka M. Felegyhazi and L. Buttyan. A survey of interdependent information security games. ACM Computing Surveys 2015.

  • [33] R. S. Laufer H. M. Proshansky and M. Wolfe. Some analytic dimensions of privacy. In Proceedings of the Lund Conference on Architectural Psychology. Lund Sweden 1973.

  • [34] R. S. Laufer and M. Wolfe. Privacy as a concept and a social issue: A multidimensional developmental theory. Journal of social Issues 33(3):22–42 1977.

  • [35] M. Li H. Zhu Z. Gao S. Chen L. Yu S. Hu and K. Ren. All your location are belong to us: Breaking mobile social networks for automated user location tracking. In MobiHoc 2014.

  • [36] D. Meier Y. A. Oswald S. Schmid and R. Wattenhofer. On the Windfall of Friendship: Inoculation Strategies on Social Networks. In EC 2008.

  • [37] A. Mislove B. Viswanath K. P. Gummadi and P. Druschel. You are who you know: Inferring user profiles in online social networks. In WSDM 2010.

  • [38] G. Misra and J. M. Such. Pacman: Personal agent for access control in social media. IEEE Internet Computing 21(6):18–26 2017.

  • [39] R. B. Myerson. Game theory. Harvard university press 2013.

  • [40] A. Noulas M. Musolesi M. Pontil and C. Mascolo. Inferring interests from mobility and social interactions. In Proc. of NIPS Workshops 2009.

  • [41] A.-M. Olteanu K. Huguenin R. Shokri M. Humbert and J.-P. Hubaux. Quantifying interdependent privacy risks with location data. In IEEE Trans. Mobile Comput. 2016.

  • [42] Z. D. Ozdemir H. J. Smith and J. H. Benamati. Antecedents and outcomes of information privacy concerns in a peer context: An exploratory study. European Journal of Information Systems 26(6):642–660 2017.

  • [43] X. Page B. P. Knijnenburg and A. Kobsa. FYI: Communication Style Preferences Underlie Differences in Location-sharing Adoption and Usage. In UbiComp 2013.

  • [44] I. Polakis G. Argyros T. Petsios S. Sivakorn and A. D. Keromytis. Where’s wally?: Precise user discovery attacks in location proximity services. In CCS pages 817–828 2015.

  • [45] Y. Pu and J. Grossklags. An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences. In GameSec 2014.

  • [46] Y. Pu and J. Grossklags. Towards a model on the factors influencing social app users’ valuation of interdependent privacy. PoPETS 2015.

  • [47] Y. Pu and J. Grossklags. Using conjoint analysis to investigate the value of interdependent privacy in social app adoption scenarios. In ICIS. Assoc. for Information Systems 2015.

  • [48] Y. Pu and J. Grossklags. Valuating friends’ privacy: Does anonymity of sharing personal data matter? In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association 2017.

  • [49] S. Rajtmajer A. Squicciarini J. M. Such J. Semonsen and A. Belmonte. An ultimatum game model for the evolution of privacy in jointly managed content. In International Conference on Decision and Game Theory for Security pages 112–130. Springer 2017.

  • [50] K. Raynes-Goldie. Aliases creeping and wall cleaning: Understanding privacy in the age of facebook. First Monday 15(1) 2010.

  • [51] E. M. Redmiles M. L. Mazurek and J. P. Dickerson. Poster: Do users make rational security decisions? 2018.

  • [52] C. Riederer D. Echickson S. Huang and A. Chaintreau. Findyou: A personal location privacy auditing tool. In WWW 2016.

  • [53] J. Ross L. Irani M. S. Silberman A. Zaldivar and B. Tomlinson. Who are the crowdworkers?: Shifting demographics in mechanical turk. In CHI 2010.

  • [54] R. Shokri. Privacy games: Optimal user-centric data obfuscation. PoPETS 2015(2) 2015.

  • [55] R. Shokri G. Theodorakopoulos C. Troncoso J.-P. Hubaux and J.-Y. Le Boudec. Protecting location privacy: optimal strategy against localization attacks. In CCS’12: Proc. of the 19th ACM Conf. on Computer and Communications Security 2012.

  • [56] Y. Shoshitaishvili C. Kruegel and G. Vigna. Portrait of a privacy invasion; detecting relationships through large-scale photo analysis. PoPETS 2015.

  • [57] J. M. Such and N. Criado. Resolving multi-party privacy conflicts in social media. IEEE KDE 2016.

  • [58] J. M. Such J. Porter S. Preibusch and A. Joinson. Photo privacy conflicts in social media: A large-scale empirical study. In Proc. of CHI 2017.

  • [59] E. Toch J. Cranshaw P. H. Drielsma J. Y. Tsai P. G. Kelley J. Springfield L. Cranor J. Hong and N. Sadeh. Empirical models of privacy in location sharing. In UbiComp 2010.

  • [60] J. Von Neumann and O. Morgenstern. Theory of games and economic behavior. Princeton university press 2007.

  • [61] N. Vratonjic K. Huguenin V. Bindschaedler and J.-P. Hubaux. A Location-Privacy Threat Stemming from the Use of Shared Public IP. IEEE Trans. on Mobile Computing (TMC) 13(11) Nov. 2014.

  • [62] G. Wang S. Y. Schoenebeck H. Zheng and B. Y. Zhao. “will check-in for badges”: Understanding bias and misbehavior on location-based social networks. In ICWSM 2016.

  • [63] A. F. Westin. Social and political dimensions of privacy. Journal of social issues 59(2):431–453 2003.

  • [64] J. Wiese P. G. Kelley L. F. Cranor L. Dabbish J. I. Hong and J. Zimmerman. Are you close with me? are you nearby?: Investigating social groups closeness and willingness to share. In UbiComp 2011.

  • [65] P. Wisniewski H. Lipford and D. Wilson. Fighting for my space: Coping mechanisms for sns boundary regulation. In Proc. of SIGCHI. ACM 2012.

  • [66] Xlstat statistical software for microsoft excel. https://www.xlstat.com/en/ 2016. last visited: Aug. 2016.

  • [67] F. Xu Z. Tu Y. Li P. Zhang X. Fu and D. Jin. Trajectory recovery from ash: User privacy is not preserved in aggregated mobility data. In Proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee 2017.

  • [68] H. Xu. Reframing privacy 2.0 in online social network. U. Pa. J. Const. L. 2011.

  • [69] M. Xue C. Ballard K. Liu C. Nemelka Y. Wu K. Ross and H. Qian. You can yak but you can’t hide: Localizing anonymous social network users. In Proceedings of the 2016 Internet Measurement Conference pages 25–31. ACM 2016.

  • [70] M. Xue Y. Liu K. W. Ross and H. Qian. I know where you are: thwarting privacy protection in location-based social discovery services. In IEEE Conference on Computer Communications Workshops pages 179–184. IEEE 2015.

  • [71] M. Yang Y. Yu A. K. Bandara and B. Nuseibeh. Adaptive sharing for online social networks: A trade-off between privacy risk and social benefit. In TrustCom 2014.

  • [72] Y. Zheng L. Liu L. Wang and X. Xie. Learning transportation mode from raw GPS data for geographic applications on the web. In WWW pages 247–256 2008.

Search
Journal information
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 209 209 30
PDF Downloads 128 128 10