ﻻ يوجد ملخص باللغة العربية
Data sharing between different organizations is an essential process in todays connected world. However, recently there were many concerns about data sharing as sharing sensitive information can jeopardize users privacy. To preserve the privacy, organizations use anonymization techniques to conceal users sensitive data. However, these techniques are vulnerable to de-anonymization attacks which aim to identify individual records within a dataset. In this paper, a two-tier mathematical framework is proposed for analyzing and mitigating the de-anonymization attacks, by studying the interactions between sharing organizations, data collector, and a prospective attacker. In the first level, a game-theoretic model is proposed to enable sharing organizations to optimally select their anonymization levels for k-anonymization under two potential attacks: background-knowledge attack and homogeneity attack. In the second level, a contract-theoretic model is proposed to enable the data collector to optimally reward the organizations for their data. The formulated problems are studied under single-time sharing and repeated sharing scenarios. Different Nash equilibria for the proposed game and the optimal solution of the contract-based problem are analytically derived for both scenarios. Simulation results show that the organizations can optimally select their anonymization levels, while the data collector can benefit from incentivizing the organizations to share their data.
We describe a structured system for distributed mechanism design. It consists of a sequence of layers. The lower layers deal with the operations relevant for distributed computing only, while the upper layers are concerned only with communication amo
The study of approximate mechanism design for facility location problems has been in the center of research at the intersection of artificial intelligence and economics for the last decades, largely due to its practical importance in various domains,
Mobile crowdsensing (MCS) has been intensively explored recently due to its flexible and pervasive sensing ability. Although many incentive mechanisms have been built to attract extensive user participation, Most of these mechanisms focus only on ind
In the standard Mechanism Design framework (Hurwicz-Reiter), there is a central authority that gathers agents messages and subsequently determines the allocation and tax for each agent. We consider a scenario where, due to communication overhead an
The auction theory literature has so far focused mostly on the design of mechanisms that takes the revenue or the efficiency as a yardstick. However, scenarios where the {it capacity}, which we define as textit{``the number of bidders the auctioneer