Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading

被引:0
|
作者
Zhang, Man [1 ]
Li, Xinghua [1 ,2 ]
Miao, Yinbin [1 ]
Luo, Bin [1 ]
Xu, Wanyun [1 ]
Ren, Yanbing [1 ]
Deng, Robert H. [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Minist Educ, Engn Res Ctr Big Data Secur, Xian 710071, Peoples R China
[3] Singapore Management Univ, Dept Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Data trading; data privacy; purchase privacy; disturbance truthfulness; origin truthfulness;
D O I
10.1109/TIFS.2024.3402162
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advanced data trading allows data generator's (DG) disturbed data to be traded as both initial and reselling trading modes, which meets DG's raw data privacy and data consumers' (DCs) vast data requirement. However, the traded data truthfulness verifiability cannot be guaranteed in the privacy-preserved way. Firstly, due to DG's independent and random disturbance, DC cannot verify whether the traded data is disturbed under his required disturbance parameter without carrying privacy leakage on DG. Secondly, because the reselling trading is allowed, DC can hardly verify the traded data's origin truthfulness under the deceiving of data reseller (DR) while protecting his purchase privacy. Aiming at the above problems, we propose the privacy-preserved data disturbance and truthfulness verification for data trading. Specifically, an honest-but-curious trading server (TS) is introduced to assist our devised private-verifiable imprint-embedded disturbance method where imprint is blinding. Subsequently, TS implements the adaptive truthfulness verification by constructing imprint-embedded individual verification formula and requiring verified participants to decrypt the formula result. The verified participants cannot inform the blinding imprint value to forge the correct result, ensuring the accuracy of the devised verification method. Theoretical analysis proves that participants' privacy is preserved and the traded data's truthfulness can be guaranteed. Extensive experiments using the real-world dataset demonstrate that without any extra privacy cost, our scheme verifies 100% untruthful traded data compared with the existing solutions' 50%.
引用
收藏
页码:5545 / 5560
页数:16
相关论文
共 50 条
  • [31] Privacy-Preserved Federated Learning for Autonomous Driving
    Li, Yijing
    Tao, Xiaofeng
    Zhang, Xuefei
    Liu, Junjie
    Xu, Jin
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2022, 23 (07) : 8423 - 8434
  • [32] Privacy-Preserved Neural Graph Similarity Learning
    Hou, Yupeng
    Zhao, Wayne Xin
    Li, Yaliang
    Wen, Ji-Rong
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2022, : 191 - 200
  • [33] Privacy-Preserved Prediction for Mobile Application Adoption
    Wang, Changxu
    Chu, Jing
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 184 - 194
  • [34] Privacy-Preserved Key Agreement with User Authentication
    Hsu, Chien-Lung
    Lin, Tzu-Wei
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 12 - 17
  • [35] Privacy-Preserved Access Control for Cloud Computing
    Zhou, Miao
    Mu, Yi
    Susilo, Willy
    Au, Man Ho
    Yan, Jun
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 83 - 90
  • [36] PEX: Privacy-Preserved, Multi-Tier Exchange Framework for Cross Platform Virtual Assets Trading
    Sangpetch, Akkarit
    Sangpetch, Orathai
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [37] H2SA-ALSH: A Privacy-Preserved Indexing and Searching Schema for IoT Data Collection and Mining
    Wu, Guangjun
    Zhu, Bingqing
    Li, Jun
    Wang, Yong
    Jia, Yungang
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [38] Estimating parameters for probabilistic linkage of privacy-preserved datasets
    Adrian P. Brown
    Sean M. Randall
    Anna M. Ferrante
    James B. Semmens
    James H. Boyd
    BMC Medical Research Methodology, 17
  • [39] Estimating parameters for probabilistic linkage of privacy-preserved datasets
    Brown, Adrian P.
    Randall, Sean M.
    Ferrante, Anna M.
    Semmens, James B.
    Boyd, James H.
    BMC MEDICAL RESEARCH METHODOLOGY, 2017, 17
  • [40] A Novel Blockchain-Based Privacy-Preserved Data Sharing Using Deep Maxout Network in Federated Learning
    Suganthi, S.
    Kala, T. Sree
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2024,