Privacy-Aware Data Trading

被引:5
|
作者
Wang, Shengling [1 ]
Shi, Lina [1 ]
Hu, Qin [2 ]
Zhang, Junshan [3 ]
Cheng, Xiuzhen [4 ]
Yu, Jiguo [5 ]
机构
[1] Beijing Normal Univ, Sch Artificial Intelligence, Beijing 100875, Peoples R China
[2] Indiana Univ Purdue Univ Indianapolis, Dept Comp & Informat Sci, Indianapolis, IN 46202 USA
[3] Arizona State Univ, Sch Elect Comp & Energy Engn, Tempe, AZ 85281 USA
[4] Shandong Univ, Sch Comp Sci & Technol, Qingdao 266510, Peoples R China
[5] Qilu Univ Technol, Sch Comp Sci & Technol, Jinan 250353, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Data privacy; Games; Noise measurement; Numerical simulation; Cost accounting; Privacy; Economics; Data trading; privacy leakage; the zero-determinant strategies; the noisy sequential game;
D O I
10.1109/TIFS.2021.3099699
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growing threat of personal data breach in data trading pinpoints an urgent need to develop countermeasures for preserving individual privacy. The state-of-the-art work either endows the data collector with the responsibility of data privacy or reports only a privacy-preserving version of the data. The basic assumption of the former approach that the data collector is trustworthy does not always hold true in reality, whereas the latter approach reduces the value of data. In this paper, we investigate the privacy leakage issue from the root source. Specifically, we take a fresh look to reverse the inferior position of the data provider by making her dominate the game with the collector to solve the dilemma in data trading. To that aim, we propose the noisy-sequentially zero-determinant (NSZD) strategies by tailoring the classical zero-determinant strategies, originally designed for the simultaneous-move game, to adapt to the noisy sequential game. NSZD strategies can empower the data provider to unilaterally set the expected payoff of the data collector or enforce a positive relationship between her and the data collector's expected payoffs. Both strategies can stimulate a rational data collector to behave honestly, boosting a healthy data trading market. Numerical simulations are used to examine the impacts of key parameters and the feasible region where the data provider can be an NSZD player. Finally, we prove that the data collector cannot employ NSZD to further dominate the data market for deteriorating privacy leakage.
引用
收藏
页码:3916 / 3927
页数:12
相关论文
共 50 条
  • [41] Privacy-aware loyalty programs
    Blanco-Justicia, Alberto
    Domingo-Ferrer, Josep
    [J]. COMPUTER COMMUNICATIONS, 2016, 82 : 83 - 94
  • [42] Privacy-Aware Rejection Sampling
    Awan, Jordan
    Rao, Vinayak
    [J]. JOURNAL OF MACHINE LEARNING RESEARCH, 2023, 24 : 1 - 32
  • [43] Privacy-aware Linked Widgets
    Fernandez, Javier D.
    Ekaputra, Fajar J.
    Aryan, Peb Ruswono
    Kiesling, Elmar
    Azzam, Amr
    [J]. COMPANION OF THE WORLD WIDE WEB CONFERENCE (WWW 2019 ), 2019, : 508 - 514
  • [44] Privacy-Aware MMSE Estimation
    Asoodeh, Shahab
    Alajaji, Fady
    Linder, Tamas
    [J]. 2016 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, 2016, : 1989 - 1993
  • [45] Optimal Privacy-Aware Estimation
    Nekouei, Ehsan
    Sandberg, Henrik
    Skoglund, Mikael
    Johansson, Karl Henrik
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (05) : 2253 - 2266
  • [46] Privacy as a Service: Privacy-Aware Data Storage and Processing in Cloud Computing Architectures
    Itani, Wassim
    Kayssi, Ayman
    Chehab, Ali
    [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 711 - 716
  • [47] Privacy-aware service integration
    Parrend, Pierre
    Frenot, Stephane
    Hoehn, Sebastian
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, 2007, : 397 - +
  • [48] On privacy-aware eScience workflows
    Khalid Belhajjame
    Noura Faci
    Zakaria Maamar
    Vanilson Burégio
    Edvan Soares
    Mahmoud Barhamgi
    [J]. Computing, 2020, 102 : 1171 - 1185
  • [49] Privacy-Aware Traffic Monitoring
    Xie, Hairuo
    Kulik, Lars
    Tanin, Egemen
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2010, 11 (01) : 61 - 70
  • [50] Towards a Privacy-Aware Quantified Self Data Management Framework
    Thuraisingham, Bhavani
    Kantarcioglu, Murat
    Bertino, Elisa
    Bakdash, Jonathan Z.
    Fernandez, Maribel
    [J]. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 173 - 184