%0 Conference Proceedings %T Privacy Consensus in Anonymization Systems via Game Theory %+ Department of Computer Science %A Karimi Adl, Rosa %A Askari, Mina %A Barker, Ken %A Safavi-Naini, Reihaneh %Z Part 3: Confidentiality and Privacy %< avec comité de lecture %( Lecture Notes in Computer Science %B 26th Conference on Data and Applications Security and Privacy (DBSec) %C Paris, France %Y Nora Cuppens-Boulahia %Y Frédéric Cuppens %Y Joaquin Garcia-Alfaro %I Springer %3 Data and Applications Security and Privacy XXVI %V LNCS-7371 %P 74-89 %8 2012-07-11 %D 2012 %R 10.1007/978-3-642-31540-4_6 %K Privacy Protection %K Data Anonymization %K Privacy/Utility Trade-off %K Privacy Parameter Setting %K Game Theory %K k-Anonymity %Z Computer Science [cs]Conference papers %X Privacy protection appears as a fundamental concern when personal data is collected, stored, and published. Several anonymization methods have been proposed to address privacy issues in private datasets. Every anonymization method has at least one parameter to adjust the level of privacy protection considering some utility for the collected data. Choosing a desirable level of privacy protection is a crucial decision and so far no systematic mechanism exists to provide directions on how to set the privacy parameter. In this paper, we model this challenge in a game theoretic framework to find consensual privacy protection levels and recognize the characteristics of each anonymization method. Our model can potentially be used to compare different anonymization methods and distinguish the settings that make one anonymization method more appealing than the others. We describe the general approach to solve such games and elaborate the procedure using k-anonymity as a sample anonymization method. Our simulations of the game results in the case of k-anonymity reveals how the equilibrium values of k depend on the number of quasi-identifiers, maximum number of repetitive records, anonymization cost, and public’s privacy behaviour. %G English %Z TC 11 %Z WG 11.3 %2 https://inria.hal.science/hal-01534775/document %2 https://inria.hal.science/hal-01534775/file/978-3-642-31540-4_6_Chapter.pdf %L hal-01534775 %U https://inria.hal.science/hal-01534775 %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-3 %~ IFIP-DBSEC %~ IFIP-LNCS-7371