Table 1: Payoff Matrix for 4 party scenario showing Nash Equilibrium state as well.
Policy Used A,B,C,D R
1
R
2
R
3
R
4
R
5
R
6
R
7
1,2,3 G,G,G,G
3,3,3,3
(NE)
3,3,3,3 3,3,3,3 3,3,3,3 3,3,3,3 3,3,3,3 3,3,3,3
1,2 G,G,G,B 1,1,1,6 2,2,2,0
3,3,3,3
(NE)
3,3,3,3 3,3,3,3 3,3,3,3 3,3,3,3
3 G,G,G,B 1,1,1,6
3,3,3,3
(NE)
3,3,3,3 3,3,3,3 3,3,3,3 3,3,3,3 3,3,3,3
1 G,G,B,B -1,-1,5,5 1,1,0,0 2,2,2,0 1,1,1,6 2,2,2,0 2,2,2,0
3,3,3,3
(NE)
2 G,G,B,B -1,-1,5,5 1,1,0,0 2,2,2,0 1,1,1,6 2,2,2,0
3,3,3,3
(NE)
3,3,3,3
3 G,G,B,B -1,-1,5,5 2,2,2,0
3,3,3,3
(NE)
3,3,3,3 3,3,3,3 3,3,3,3 3,3,3,3
the no. of rounds taken to attain the Nash
equilibrium. For all these policies we have
considered different percentage of initial bad
rational nodes that refrain from sending their shares.
Among these policies our results show that the Nash
equilibrium is attained in the least no. of rounds for
Policy 3 which simulates an actual game setting.
Finally we conclude that our protocol works in
the favour of all the rational parties to attain a state
where all parties are honest ultimately and has the
maximum utility considering that they take their
future utilities in account.
However there are a few open research
challenges which include extending our scheme
using game theory to verifiable secret sharing as
well as to prevent the malicious adversaries. Another
extension would be to analyse the application of our
punishment policies to other privacy preserving
schemes in distributed data mining.
ACKNOWLEDGEMENTS
I would like to thank my student Neeraj Sen for the
discussions on this problem and also for assisting me
in the implementation. I would also like to thank my
husband Rohan for the endless talks and motivation.
REFERENCES
Abraham, I., Dolev, D., Gonen, R., and Halpern, J. (2006).
Distributed computing meets game theory: robust
mechanisms for rational secret sharing and multiparty
computation. In Proceedings of the twenty-fifth annual
ACM symposium on Principles of distributed
computing, PODC ’06, pages 53–62, NY, USA. ACM.
Ge, X., Yan, L., Zhu, J., and Shi, W. (2010). Privacy-
preserving distributed association rule mining based
on the secret sharing technique. In Software
Engineering and Data Mining (SEDM), 2010 2nd
International Conference on, pages 345 –350.
Kargupta, H., Das, K., and Liu, K. (2007). A game
theoretic approach toward multi-party privacy-
preserving distributed data mining. In Proceedings of
the 11th European Conference on Principles and
Practice of Knowledge Discovery in Databases,
Warsaw, Poland, 2007, pages 523–531, Springer.
Maleka, S., Shareef, A., and Rangan, C. P. (2008).
Rational secret sharing with repeated games. In
Proceedings of the 4th international conference on
Information security practice and experience,
ISPEC’08, pages 334–346, Berlin, Springer-Verlag.
Miyaji, A. and Rahman, M. S. (2011). Privacy-preserving
data mining: a game-theoretic approach. In
Proceedings of the 25th IFIP WG 11.3 conference on
Data and applications security and privacy,
DBSec’11, pages 186–200, Berlin. Springer-Verlag.
Nanavati, N. R. and Jinwala, D. C. (2012). Privacy
preserving approaches for global cycle detections for
cyclic association rules in distributed databases. In
SECRYPT, pages 368–371.
Nanavati, N. R. and Jinwala, D. C. (2013). A Novel
Privacy preserving game theoretic repeated rational
secret sharing scheme for distributed data mining. In
Security and Privacy Symposium, Kanpur.
Patel, S., Garasia, S., and Jinwala, D. C. (2012). An
efficient approach for privacy preserving distributed k-
means clustering based on shamir’s secret sharing
scheme. In IFIPTM, pages 129–141.
Pedersen, T. B., Saygin, Y., and Savas, E. (2007). Secret
Sharing vs. Encryption-based Techniques For Privacy
Preserving Data Mining. Sciences-New York, 17–19.
Shamir, A. (1979). How to share a secret. Commun.
ACM, 22:612–613.
AGameTheorybasedRepeatedRationalSecretSharingSchemeforPrivacyPreservingDistributedDataMining
517