Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading

被引:0
|
作者
Zhang, Man [1 ]
Li, Xinghua [1 ,2 ]
Miao, Yinbin [1 ]
Luo, Bin [1 ]
Xu, Wanyun [1 ]
Ren, Yanbing [1 ]
Deng, Robert H. [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Minist Educ, Engn Res Ctr Big Data Secur, Xian 710071, Peoples R China
[3] Singapore Management Univ, Dept Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Data trading; data privacy; purchase privacy; disturbance truthfulness; origin truthfulness;
D O I
10.1109/TIFS.2024.3402162
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advanced data trading allows data generator's (DG) disturbed data to be traded as both initial and reselling trading modes, which meets DG's raw data privacy and data consumers' (DCs) vast data requirement. However, the traded data truthfulness verifiability cannot be guaranteed in the privacy-preserved way. Firstly, due to DG's independent and random disturbance, DC cannot verify whether the traded data is disturbed under his required disturbance parameter without carrying privacy leakage on DG. Secondly, because the reselling trading is allowed, DC can hardly verify the traded data's origin truthfulness under the deceiving of data reseller (DR) while protecting his purchase privacy. Aiming at the above problems, we propose the privacy-preserved data disturbance and truthfulness verification for data trading. Specifically, an honest-but-curious trading server (TS) is introduced to assist our devised private-verifiable imprint-embedded disturbance method where imprint is blinding. Subsequently, TS implements the adaptive truthfulness verification by constructing imprint-embedded individual verification formula and requiring verified participants to decrypt the formula result. The verified participants cannot inform the blinding imprint value to forge the correct result, ensuring the accuracy of the devised verification method. Theoretical analysis proves that participants' privacy is preserved and the traded data's truthfulness can be guaranteed. Extensive experiments using the real-world dataset demonstrate that without any extra privacy cost, our scheme verifies 100% untruthful traded data compared with the existing solutions' 50%.
引用
收藏
页码:5545 / 5560
页数:16
相关论文
共 50 条
  • [21] Write-only oblivious RAM-based privacy-preserved access of outsourced data
    Lichun Li
    Anwitaman Datta
    International Journal of Information Security, 2017, 16 : 23 - 42
  • [22] Privacy-Preserved Data-Enabled Predictive Control for Connected and Automated Vehicles in Mixed Traffic
    Zhang, Kaixiang
    Chen, Kaian
    Li, Zhaojian
    Zheng, Yang
    2022 IEEE 25TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS (ITSC), 2022, : 2648 - 2654
  • [23] Enterprise Data Sharing with Privacy-Preserved Based on Hyperledger Fabric Blockchain in IIOT's Application
    Chen, Chin-Ling
    Yang, Jiaxin
    Tsaur, Woei-Jiunn
    Weng, Wei
    Wu, Chih-Ming
    Wei, Xiaojun
    SENSORS, 2022, 22 (03)
  • [24] Write-only oblivious RAM-based privacy-preserved access of outsourced data
    Li, Lichun
    Datta, Anwitaman
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (01) : 23 - 42
  • [25] Privacy-preserved data hiding using compressive sensing and fuzzy C-means clustering
    Li, Ming
    Wang, Lanlan
    Fan, Haiju
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (02)
  • [26] Hierarchical Privacy-preserved Knowledge Graph
    Chen, Xiaolu
    Bao, Jie
    Zhou, Pengyuan
    Liao, Yong
    2023 IEEE 43RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, ICDCS, 2023, : 977 - 978
  • [27] Research on the Privacy-Preserved Mechanism of Supercomputer Systems
    Yang, Bi-kuan
    Liu, Guang-ming
    CURRENT TRENDS IN COMPUTER SCIENCE AND MECHANICAL AUTOMATION, VOL 1, 2017, : 102 - 113
  • [28] A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications
    Song, Wei
    Wang, Bing
    Wang, Qian
    Peng, Zhiyong
    Lou, Wenjing
    Cui, Yihui
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2017, 99 : 14 - 27
  • [29] Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment
    Stewart Kirubakaran S.
    Arunachalam V.P.
    Karthik S.
    Kannan S.
    Computer Systems Science and Engineering, 2023, 44 (03): : 1881 - 1895
  • [30] Privacy-Preserved Conference Key Distribution Protocol
    Hsu, Chien-Lung
    Lin, Tzu-Wei
    Lu, Huang-Chia
    Chuang, Tzu-Hsien
    Chen, Yu-Han
    2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 127 - 132