2010
DOI: 10.1007/978-3-642-15838-4_23
|View full text |Cite
|
Sign up to set email alerts
|

Coprivacy: Towards a Theory of Sustainable Privacy

Abstract: Abstract.We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her privacy is to help another player in preserving his privacy. Coprivacy makes an individual's privacy preservation a goal that rationally interests other individuals: it is a matter of helping oneself by helping someone else. We formally define coprivacy in terms of Nash equilibria. We then extend the concept to: i) general … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
23
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(23 citation statements)
references
References 15 publications
(18 reference statements)
0
23
0
Order By: Relevance
“…If the utility functions U in Definition 1 only considers privacy, co-utility becomes the co-privacy notion introduced in [5,6]; if utilities only consider security, we could speak of co-security; if they only consider functionality, co-utility becomes co-functionality. We can use these definitions to obtain a game-theoretic model for the emergency reporting protocol with the following notations: (1) P i is the witness of the emergency or wants to attack the system; (2) P j is a hop (another member of the group) contacted by the witness to forward the emergency report to the reporter.…”
Section: Co-utility Model For the Proposed Solutionmentioning
confidence: 99%
See 1 more Smart Citation
“…If the utility functions U in Definition 1 only considers privacy, co-utility becomes the co-privacy notion introduced in [5,6]; if utilities only consider security, we could speak of co-security; if they only consider functionality, co-utility becomes co-functionality. We can use these definitions to obtain a game-theoretic model for the emergency reporting protocol with the following notations: (1) P i is the witness of the emergency or wants to attack the system; (2) P j is a hop (another member of the group) contacted by the witness to forward the emergency report to the reporter.…”
Section: Co-utility Model For the Proposed Solutionmentioning
confidence: 99%
“…Our proposal stems from a game-theoretic design inspired by the co-privacy (co-utility) approach [5,6], which leads to a mechanism of rewards and punishments to encourage legitimate information and discourage false reporting. Unlike existing emergency management systems in which witnesses are required to reveal their identities or personal information to the emergency service provider, our system protects the witness's identity by using the concept of groups, in such a way that the witness is indistinguishable from other members of the group.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, every 2 years the UNESCO sponsors an international conference (i.e., Privacy in Statistical Databases) that gathers worldwide experts from different disciplines to discuss current issues in the field. Proceedings are published by Springer in the series Lecture Notes in Computer Science (Domingo-Ferrer, 2002;Domingo-Ferrer & Franconi, 2006;Domingo-Ferrer & Magkos, 2010;Domingo-Ferrer & Saygin, 2008;DomingoFerrer & Torra, 2004;European Communities, 1998).…”
Section: Need For Protection Need For Informationmentioning
confidence: 99%
“…In addition, every 2 years the UNESCO sponsors an international conference (i.e., Privacy in Statistical Databases) that gathers worldwide experts from different disciplines to discuss current issues in the field. Proceedings are published by Springer in the series Lecture Notes in Computer Science (Domingo-Ferrer, Prada et al 3 2002;Domingo-Ferrer & Franconi, 2006;Domingo-Ferrer & Magkos, 2010;Domingo-Ferrer & Saygin, 2008; DomingoFerrer & Torra, 2004;European Communities, 1998).More recently, the book by Duncan, Elliot, and SalazarGonzález (2011) provides a comprehensive understanding of the principles and practice of statistical confidentiality. Other recent technical reviews are those by B. Chen, Kifer, LeFevre, andMachanavajjhala (2009) andFung, Wang, Chen, andYu (2010) on the latest developments in the field of Privacypreserving data publishing, and by Fayyoumi and Oommen (2010) on statistical disclosure control and microaggregation techniques for secure statistical databases.…”
mentioning
confidence: 99%
“…Domingo-Ferrer initiates epitome of cooperation in privacy and termed it as Co-Privacy [4,5]. However, CoV (cooperative value) is modeled, that estimates the cooperation between the tuples using Cooperative Game Theory and it is titled as cooperative privacy.…”
mentioning
confidence: 99%