Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading

被引:0
|
作者
Zhang, Man [1 ]
Li, Xinghua [1 ,2 ]
Miao, Yinbin [1 ]
Luo, Bin [1 ]
Xu, Wanyun [1 ]
Ren, Yanbing [1 ]
Deng, Robert H. [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Minist Educ, Engn Res Ctr Big Data Secur, Xian 710071, Peoples R China
[3] Singapore Management Univ, Dept Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Data trading; data privacy; purchase privacy; disturbance truthfulness; origin truthfulness;
D O I
10.1109/TIFS.2024.3402162
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advanced data trading allows data generator's (DG) disturbed data to be traded as both initial and reselling trading modes, which meets DG's raw data privacy and data consumers' (DCs) vast data requirement. However, the traded data truthfulness verifiability cannot be guaranteed in the privacy-preserved way. Firstly, due to DG's independent and random disturbance, DC cannot verify whether the traded data is disturbed under his required disturbance parameter without carrying privacy leakage on DG. Secondly, because the reselling trading is allowed, DC can hardly verify the traded data's origin truthfulness under the deceiving of data reseller (DR) while protecting his purchase privacy. Aiming at the above problems, we propose the privacy-preserved data disturbance and truthfulness verification for data trading. Specifically, an honest-but-curious trading server (TS) is introduced to assist our devised private-verifiable imprint-embedded disturbance method where imprint is blinding. Subsequently, TS implements the adaptive truthfulness verification by constructing imprint-embedded individual verification formula and requiring verified participants to decrypt the formula result. The verified participants cannot inform the blinding imprint value to forge the correct result, ensuring the accuracy of the devised verification method. Theoretical analysis proves that participants' privacy is preserved and the traded data's truthfulness can be guaranteed. Extensive experiments using the real-world dataset demonstrate that without any extra privacy cost, our scheme verifies 100% untruthful traded data compared with the existing solutions' 50%.
引用
下载
收藏
页码:5545 / 5560
页数:16
相关论文
共 50 条
  • [1] Privacy-Preserved Data Trading Via Verifiable Data Disturbance
    Zhang, Man
    Li, Xinghua
    Ren, Yanbing
    Luo, Bin
    Miao, Yinbin
    Liu, Ximeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 3126 - 3140
  • [2] Privacy-Preserved Network Data Publishing
    Chen, Lei
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, DASFAA 2011, 2011, 6637 : 1 - 1
  • [3] Training Encrypted Models with Privacy-preserved Data on Blockchain
    Liu, Lifeng
    Hu, Yifan
    Yu, Jiawei
    Zhang, Fengda
    Huang, Gang
    Xiao, Jun
    Wu, Chao
    ICVISP 2019: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON VISION, IMAGE AND SIGNAL PROCESSING, 2019,
  • [4] Trading Data in Good Faith: Integrating Truthfulness and Privacy Preservation in Data Markets
    Niu, Chaoyue
    Zheng, Zhenzhe
    Wu, Fan
    Gao, Xiaofeng
    Chen, Guihai
    2017 IEEE 33RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2017), 2017, : 223 - 226
  • [5] Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors
    Rezaeibagha, Fatemeh
    Mu, Yi
    Huang, Ke
    Zhang, Leyou
    Huang, Xinyi
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24) : 17669 - 17677
  • [6] A classification method for privacy-preserved data using bayesian rule
    Yang, Pan
    Gui, Xiaolin
    An, Jian
    Tian, Feng
    Wang, Gang
    Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2015, 49 (04): : 46 - 52
  • [7] SMC: A Practical Schema for Privacy-Preserved Data Sharing over Distributed Data Streams
    Smeal Business College, Pennsylvania State University, University Park
    PA, United States
    不详
    不详
    不详
    IEEE Trans. Big Data, 2 (68-81):
  • [8] Efficient privacy-preserved data query over ciphertext in cloud computing
    Song, Wei
    Peng, Zhiyong
    Wang, Qian
    Cheng, Fangquan
    Wu, Xiaoxin
    Cui, Yihui
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (06) : 1049 - 1065
  • [9] Privacy-Preserved Data Sharing Towards Multiple Parties in Industrial IoTs
    Zheng, Xu
    Cai, Zhipeng
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2020, 38 (05) : 968 - 979
  • [10] Blockchain and Federated Learning for Privacy-Preserved Data Sharing in Industrial IoT
    Lu, Yunlong
    Huang, Xiaohong
    Dai, Yueyue
    Maharjan, Sabita
    Zhang, Yan
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) : 4177 - 4186