Data Privacy Games

Nonfiction, Computers, Advanced Computing, Theory, Database Management, General Computing
Cover of the book Data Privacy Games by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren ISBN: 9783319779652
Publisher: Springer International Publishing Publication: April 24, 2018
Imprint: Springer Language: English
Author: Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
ISBN: 9783319779652
Publisher: Springer International Publishing
Publication: April 24, 2018
Imprint: Springer
Language: English

With the growing popularity of “big data”, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue.

In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. 

The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems.

The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector’s strategies, the authors propose a contract model and a multi-armed bandit model respectively.

The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users’ strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

With the growing popularity of “big data”, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue.

In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. 

The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems.

The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector’s strategies, the authors propose a contract model and a multi-armed bandit model respectively.

The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users’ strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.

More books from Springer International Publishing

Cover of the book Reconsidering National Plays in Europe by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Social Movements and the Change of Economic Elites in Europe after 1945 by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Quantum Microscopy of Biological Systems by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Air Pollution in Eastern Asia: An Integrated Perspective by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Beyond Networks - Interlocutory Coalitions, the European and Global Legal Orders by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Innovations in Molecular Mechanisms and Tissue Engineering by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book EU International Agreements by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Social, Cultural, and Behavioral Modeling by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Ambient Intelligence by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Stability and Suppression of Turbulence in Relaxing Molecular Gas Flows by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Mathematics for Nonlinear Phenomena — Analysis and Computation by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book A Survey of Fractal Dimensions of Networks by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Engineering Aspects of Geologic CO2 Storage by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book Short Course Breast Radiotherapy by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
Cover of the book The Abductive Structure of Scientific Creativity by Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy