Privacy-Aware Data Trading

被引:5
|
作者
Wang, Shengling [1 ]
Shi, Lina [1 ]
Hu, Qin [2 ]
Zhang, Junshan [3 ]
Cheng, Xiuzhen [4 ]
Yu, Jiguo [5 ]
机构
[1] Beijing Normal Univ, Sch Artificial Intelligence, Beijing 100875, Peoples R China
[2] Indiana Univ Purdue Univ Indianapolis, Dept Comp & Informat Sci, Indianapolis, IN 46202 USA
[3] Arizona State Univ, Sch Elect Comp & Energy Engn, Tempe, AZ 85281 USA
[4] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266510, Peoples R China
[5] Qilu Univ Technol, Sch Comp Sci & Technol, Jinan 250353, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Games; Noise measurement; Numerical simulation; Cost accounting; Privacy; Economics; Data trading; privacy leakage; the zero-determinant strategies; the noisy sequential game;
D O I
10.1109/TIFS.2021.3099699
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growing threat of personal data breach in data trading pinpoints an urgent need to develop countermeasures for preserving individual privacy. The state-of-the-art work either endows the data collector with the responsibility of data privacy or reports only a privacy-preserving version of the data. The basic assumption of the former approach that the data collector is trustworthy does not always hold true in reality, whereas the latter approach reduces the value of data. In this paper, we investigate the privacy leakage issue from the root source. Specifically, we take a fresh look to reverse the inferior position of the data provider by making her dominate the game with the collector to solve the dilemma in data trading. To that aim, we propose the noisy-sequentially zero-determinant (NSZD) strategies by tailoring the classical zero-determinant strategies, originally designed for the simultaneous-move game, to adapt to the noisy sequential game. NSZD strategies can empower the data provider to unilaterally set the expected payoff of the data collector or enforce a positive relationship between her and the data collector's expected payoffs. Both strategies can stimulate a rational data collector to behave honestly, boosting a healthy data trading market. Numerical simulations are used to examine the impacts of key parameters and the feasible region where the data provider can be an NSZD player. Finally, we prove that the data collector cannot employ NSZD to further dominate the data market for deteriorating privacy leakage.
引用
收藏
页码:3916 / 3927
页数:12
相关论文
共 50 条
  • [1] Agora: A Privacy-aware Data Marketplace
    Koutsos, Vlasis
    Papadopoulos, Dimitrios
    Chatzopoulos, Dimitris
    Tarkoma, Sasu
    Hui, Pan
    [J]. 2020 IEEE 40TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS), 2020, : 1211 - 1212
  • [2] Privacy-Aware Location Data Publishing
    Hu, Haibo
    Xu, Jianliang
    On, Sai Tung
    Du, Jing
    Ng, Joseph Kee-Yin
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2010, 35 (03):
  • [3] Agora: A Privacy-Aware Data Marketplace
    Koutsos, Vlasis
    Papadopoulos, Dimitrios
    Chatzopoulos, Dimitris
    Tarkoma, Sasu
    Hui, Pan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (06) : 3728 - 3740
  • [4] Privacy-aware Synthesizing for Crowdsourced Data
    Huai, Mengdi
    Wang, Di
    Miao, Chenglin
    Xu, Jinhui
    Zhang, Aidong
    [J]. PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 2542 - 2548
  • [5] PARC: Privacy-Aware Data Cleaning
    Huang, Dejun
    Gairola, Dhruv
    Huang, Yu
    Zheng, Zheng
    Chiang, Fei
    [J]. CIKM'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2016, : 2433 - 2436
  • [6] Privacy-Aware Data-Intensive Applications
    Guerriero, Michele
    [J]. PROCEEDINGS OF THE 2017 32ND IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE'17), 2017, : 1030 - 1033
  • [7] Privacy-aware Data Storage in Cloud Computing
    Pottier, Remy
    Menaud, Jean-Marc
    [J]. CLOSER: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND SERVICES SCIENCE, 2017, : 377 - 384
  • [8] Privacy-aware Big Data Warehouse Architecture
    Navuluri, Karthik
    Mukkamala, Ravi
    Ahmad, Aftab
    [J]. 2016 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2016, 2016, : 341 - 344
  • [9] Data Curation from Privacy-Aware Agents
    Shahmoon, Roy
    Smorodinsky, Rann
    Tennenholtz, Moshe
    [J]. ALGORITHMIC GAME THEORY, SAGT 2022, 2022, 13584 : 366 - 382
  • [10] Optimal Data Acquisition with Privacy-Aware Agents
    Cummings, Rachel
    Elzayn, Hadi
    Pountourakis, Emmanouil
    Gkatzelis, Vasilis
    Ziani, Juba
    [J]. 2023 IEEE CONFERENCE ON SECURE AND TRUSTWORTHY MACHINE LEARNING, SATML, 2023, : 210 - 224