Coprivacy: an introduction to the theory and applications of co-operative privacy
نویسنده
چکیده
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her privacy is to help another player in preserving his privacy. Coprivacy makes an individual’s privacy preservation a goal that rationally interests other individuals: it is a matter of helping oneself by helping someone else. We formally define coprivacy in terms of Nash equilibria. We then extend the concept to: i) general coprivacy, where a helping player’s utility (i.e. interest) may include earning functionality and security in addition to privacy; ii) mixed coprivacy, where mixed strategies and mixed Nash equilibria are allowed with some restrictions; iii) correlated coprivacy, in which Nash equilibria are replaced by correlated equilibria. Coprivacy can be applied to any peer-to-peer (P2P) protocol. We illustrate coprivacy in P2P anonymous keyword search, in content privacy in social networks, in vehicular network communications and in controlled content distribution and digital oblivion enforcement. MSC: 91A26, 91A40, 68P20, 94A60
منابع مشابه
Coprivacy: Towards a Theory of Sustainable Privacy
We introduce the novel concept of coprivacy or co-operative privacy to make privacy preservation attractive. A protocol is coprivate if the best option for a player to preserve her privacy is to help another player in preserving his privacy. Coprivacy makes an individual’s privacy preservation a goal that rationally interests other individuals: it is a matter of helping oneself by helping someo...
متن کاملA Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications
Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...
متن کاملفرایند حفظ حریم بیماران: یک نظریه داده بنیان
Introduction: Ethics, customs, and divine and human values in all scientific and non-academic issues are accepted among all human societies in different eras. The purpose of this study was to understand the experiences of nursing professionals about the patient's privacy. Methods: 21 participants were selected by theoretical sampling which was guided by emerging categories. All participants we...
متن کاملA Narrative Review of Blockchain in Healthcare: Applications and challenges
Introduction: Healthcare as an industry has unique requirements such as patient security and privacy, interoperability, sharing, transmission, and access control of patient data. On the other hand, the advantages of blockchain technology and the compliance of these advantages with the requirements of the health industry have encouraged researchers to investigate the methods of applying blockcha...
متن کاملA Narrative Review of Blockchain in Healthcare: Applications and challenges
Introduction: Healthcare as an industry has unique requirements such as patient security and privacy, interoperability, sharing, transmission, and access control of patient data. On the other hand, the advantages of blockchain technology and the compliance of these advantages with the requirements of the health industry have encouraged researchers to investigate the methods of applying blockcha...
متن کامل