By Topic

Rational exposure: A game theoretic approach to optimize identity exposure in pervasive computing environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Feng Zhu ; Dept. of Computer Science, University of Alabama in Huntsville, USA ; Wei Zhu

In pervasive computing environments, personal information is expressed in digital forms to a great extent. Daily activities and personal preferences may be easily associated with personal identities. Privacy protection is a serious challenge. The fundamental problem is the lack of a mechanism to help people expose appropriate amounts of their identity information. We propose the Hierarchical Identity model. It expresses one's identity information from precise to general. We model privacy exposure as an extensive game. By finding the subgame perfect equilibria in the games, our approach achieves optimal exposure. It finds the most general identity information that a user wants to expose and a service provider accepts.

Published in:

Pervasive Computing and Communications, 2009. PerCom 2009. IEEE International Conference on

Date of Conference:

9-13 March 2009