Abstract
The problem of analyzing the effect of privacy concerns on the behavior of selfish utility-maximizing agents has received much attention lately. Privacy concerns are often modeled by altering the utility functions of agents to consider also their privacy loss [24,13,19,4]. Such privacy aware agents prefer to take a randomized strategy even in very simple games in which non-privacy aware agents play pure strategies. In some cases, the behavior of privacy aware agents follows the framework of Randomized Response, a well-known mechanism that preserves differential privacy.
Our work is aimed at better understanding the behavior of agents in settings where their privacy concerns are explicitly given. We consider a toy setting where agent A, in an attempt to discover the secret type of agent B, offers B a gift that one type of B agent likes and the other type dislikes. As opposed to previous works, B’s incentive to keep her type a secret isn’t the result of “hardwiring” B’s utility function to consider privacy, but rather takes the form of a payment between B and A. We investigate three different types of payment functions and analyze B’s behavior in each of the resulting games. As we show, under some payments, B’s behavior is very different than the behavior of agents with hardwired privacy concerns and might even be deterministic. Under a different payment we show that B’s BNE strategy does fall into the framework of Randomized Response.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bassily, R., Groce, A., Katz, J., Smith, A.: Coupled-worlds privacy: Exploiting adversarial uncertainty in statistical data privacy. In: FOCS (2013)
Bergemann, D., Brooks, B., Morris, S.: The Limits of Price Discrimination. Cowles Foundation Discussion Papers 1896, Cowles Foundation for Research in Economics, Yale University (May 2013), http://ideas.repec.org/p/cwl/cwldpp/1896.html
Calzolari, G., Pavan, A.: On the optimality of privacy in sequential contracting. Journal of Economic Theory 130(1) (2006)
Chen, Y., Chong, S., Kash, I.A., Moran, T., Vadhan, S.P.: Truthful mechanisms for agents that value privacy. In: EC (2013)
Chen, Y., Devanur, N.R., Pennock, D.M., Vaughan, J.W.: Removing arbitrage from wagering mechanisms. In: EC (2014)
Conitzer, V., Taylor, C.R., Wagman, L.: Hide and seek: Costly consumer privacy in a market with repeat purchases. Marketing Science 31(2) (2012)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: Privacy via distributed noise generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486–503. Springer, Heidelberg (2006)
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)
Dwork, C., Smith, A.: Differential privacy for statistics: What we know and what we want to learn. Journal of Privacy and Confidentiality 1(2), 2 (2010)
Fleischer, L., Lyu, Y.H.: Approximately optimal auctions for selling privacy when costs are correlated with data. In: EC (2012)
Ghosh, A., Ligett, K., Roth, A., Schoenebeck, G.: Buying private data without verification. In: EC (2014)
Ghosh, A., Roth, A.: Selling privacy at auction. In: EC (2011)
Gneiting, T., Raftery, A.E.: Strictly proper scoring rules, prediction, and estimation. Journal of the American Statistical Association 102(477), 359–378 (2007)
Gradwohl, R., Smorodinsky, R.: Subjective perception games and privacy. CoRR abs/1409.1487 (2014), http://arxiv.org/abs/1409.1487
Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately? In: FOCS (2008)
Mas-Colell, A., Whinston, M.D., Green, J.R.: Microeconomic Theory. Oxford University Press (June 1995)
McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: FOCS, pp. 94–103 (2007)
Nissim, K., Orlandi, C., Smorodinsky, R.: Privacy-aware mechanism design. In: EC (2012)
Nissim, K., Smorodinsky, R., Tennenholtz, M.: Approximately optimal mechanism design via differential privacy. In: ITCS (2012)
Spence, M.: Job market signalling. Quarterly Journal of Economics 87(3), 355–374 (1973)
Warner, S.L.: Randomized Response: A Survey Technique for Eliminating Evasive Answer Bias. Journal of the American Statistical Association 60(309) (March 1965)
Winkler, R.: Scoring rules and the evaluation of probabilities. Test 5(1), 1–60 (1996)
Xiao, D.: Is privacy compatible with truthfulness? In: ITCS (2013)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Chen, Y., Sheffet, O., Vadhan, S. (2014). Privacy Games. In: Liu, TY., Qi, Q., Ye, Y. (eds) Web and Internet Economics. WINE 2014. Lecture Notes in Computer Science, vol 8877. Springer, Cham. https://doi.org/10.1007/978-3-319-13129-0_30
Download citation
DOI: https://doi.org/10.1007/978-3-319-13129-0_30
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13128-3
Online ISBN: 978-3-319-13129-0
eBook Packages: Computer ScienceComputer Science (R0)