Privacy and coordination: Computing on databases with endogenous participation

Arpita Ghosh, Katrina Ligett

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

32 Scopus citations

Abstract

We propose a simple model where individuals in a privacy-sensitive population decide whether or not to participate in a pre-announced noisy computation by an analyst, so that the database itself is endogenously determined by individuals' participation choices. The privacy an agent receives depends both on the announced noise level, as well as how many agents choose to participate in the database. Each agent has some minimum privacy requirement, and decides whether or not to participate based on how her privacy requirement compares against her expectation of the privacy she will receive if she participates in the computation. This gives rise to a game amongst the agents, where each individual's privacy if she participates, and therefore her participation choice, depends on the choices of the rest of the population. We investigate symmetric Bayes-Nash equilibria, which in this game consist of threshold strategies, where all agents whose privacy requirements are weaker than a certain threshold participate and the remaining agents do not. We characterize these equilibria, which depend both on the noise announced by the analyst and the population size; present results on existence, uniqueness, and multiplicity; and discuss a number of surprising properties they display.

Original languageEnglish
Title of host publicationEC 2013 - Proceedings of the 14th ACM Conference on Electronic Commerce
Pages543-560
Number of pages18
StatePublished - 2013
Externally publishedYes
Event14th ACM Conference on Electronic Commerce, EC 2013 - Philadelphia, PA, United States
Duration: 16 Jun 201320 Jun 2013

Publication series

NameProceedings of the ACM Conference on Electronic Commerce

Conference

Conference14th ACM Conference on Electronic Commerce, EC 2013
Country/TerritoryUnited States
CityPhiladelphia, PA
Period16/06/1320/06/13

Keywords

  • Database privacy
  • Differential privacy

Fingerprint

Dive into the research topics of 'Privacy and coordination: Computing on databases with endogenous participation'. Together they form a unique fingerprint.

Cite this