Selling Data at an Auction under Privacy Constraints

被引:0
|
作者
Zhang, Mengxiao [1 ]
Beltran, Fernando [1 ]
Liu, Jiamou [2 ]
机构
[1] Univ Auckland, Business Sch, Auckland, New Zealand
[2] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Private data query combines mechanism design with privacy protection to produce aggregated statistics from privately-owned data records. The problem arises in a data marketplace where data owners have personalised privacy requirements and private data valuations. We focus on the case when the data owners are single-minded, i.e., they are willing to release their data only if the data broker guarantees to meet their announced privacy requirements. For a data broker who wants to purchase data from such data owners, we propose the Single-MindedQuery (SMQ) mechanism, which uses a reverse auction to select data owners and determine compensations. SMQ satisfies interim incentive compatibility, individual rationality, and budget feasibility. Moreover, it uses purchased privacy expectation maximisation as a principle to produce accurate outputs for commonly-used queries such as counting, median and linear predictor. The effectiveness of our method is empirically validated by a series of experiments.
引用
收藏
页码:669 / 678
页数:10
相关论文
共 50 条
  • [1] Selling privacy at auction
    Ghosh, Arpita
    Roth, Aaron
    [J]. GAMES AND ECONOMIC BEHAVIOR, 2015, 91 : 334 - 346
  • [2] Selling Off Privacy at Auction
    Olejnik, Lukasz
    Tran, Minh-Dung
    Castelluccia, Claude
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [3] A Framework for Efficient Data Anonymization under Privacy and Accuracy Constraints
    Ghinita, Gabriel
    Karras, Panagiotis
    Kalnis, Panos
    Mamoulis, Nikos
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2009, 34 (02):
  • [4] Maximizing Privacy under Data Distortion Constraints in Noise Perturbation Methods
    Rachlin, Yaron
    Probst, Katharina
    Ghani, Rayid
    [J]. PRIVACY, SECURITY, AND TRUST IN KDD, 2009, 5456 : 92 - +
  • [5] A distributed ensemble approach for mining healthcare data under privacy constraints
    Li, Yan
    Bai, Changxin
    Reddy, Chandan K.
    [J]. INFORMATION SCIENCES, 2016, 330 : 245 - 259
  • [6] Information Extraction Under Privacy Constraints
    Asoodeh, Shahab
    Diaz, Mario
    Alajaji, Fady
    Linder, Tamas
    [J]. INFORMATION, 2016, 7 (01)
  • [7] Estimation Efficiency Under Privacy Constraints
    Asoodeh, Shahab
    Diaz, Mario
    Alajaji, Fady
    Linder, Tamas
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (03) : 1512 - 1534
  • [8] Privacy Under Hard Distortion Constraints
    Liao, Jiachun
    Kosut, Oliver
    Sankar, Lalitha
    Calmon, Flavio P.
    [J]. 2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 465 - 469
  • [9] Auction Design for Spectrum Allocation Under Interference Constraints
    Barrera, Jorge
    Garcia, Alfredo
    Hong, Mingyi
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 3035 - 3041
  • [10] Portfolio delegation under short-selling constraints
    Juan-Pedro Gómez
    Tridib Sharma
    [J]. Economic Theory, 2006, 28 : 173 - 196