Competitive Data Trading Model With Privacy Valuation for Multiple Stakeholders in IoT Data Markets

被引:47
|
作者
Oh, Hyeontaek [1 ]
Park, Sangdon [1 ]
Lee, Gyu Myoung [2 ]
Choi, Jun Kyun [1 ]
Noh, Sungkee [3 ]
机构
[1] Korea Adv Inst Sci & Technol, Sch Elect Engn, Daejeon 34141, South Korea
[2] Liverpool John Moores Univ, Dept Comp Sci, Liverpool L3 5UG, Merseyside, England
[3] Elect & Telecommun Res Inst, Blockchain Technol Res Ctr, Daejeon, South Korea
来源
IEEE INTERNET OF THINGS JOURNAL | 2020年 / 7卷 / 04期
关键词
Data privacy; Data models; Cost accounting; Big Data; Internet of Things; Stakeholders; Games; Data market; Internet of Things (IoT); noncooperative game; privacy valuation; profit maximization; WILLINGNESS-TO-PAY; BIG-DATA; PERSONAL INFORMATION; SATISFACTION; EFFICIENCY; SECURITY; INTERNET; LOYALTY; PROFIT; THINGS;
D O I
10.1109/JIOT.2020.2973662
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the widespread of Internet-of-Things (IoT) environment, a big data concept has emerged to handle a large number of data generated by IoT devices. Moreover, since data-driven approaches now become important for business, IoT data markets have emerged, and IoT big data are exploited by major stakeholders, such as data brokers and data service providers. Since many services and applications utilize data analytic methods with collected data from IoT devices, the conflict issues between privacy and data exploitation are raised, and the markets are mainly categorized as privacy protection markets and privacy valuation markets, respectively. Since these kinds of data value chains (which are mainly considered by business stakeholders) are revealed, data providers are interested in proper incentives in exchange for their privacy (i.e., privacy valuation) under their agreement. Therefore, this article proposes a competitive data trading model that consists of data providers who weigh the value between privacy protection and valuation as well as other business stakeholders. Each data broker considers the willingness-to-sell of data providers, and a single data service provider considers the willingness-to-pay of service consumers. At the same time, multiple data brokers compete to sell their data set to the data service provider as a noncooperative game model. Based on the Nash equilibrium analysis (NE) of the game, the feasibility is shown that the proposed model has the unique NE that maximizes the profits of business stakeholders while satisfying all market participants.
引用
收藏
页码:3623 / 3639
页数:17
相关论文
共 50 条
  • [41] Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy
    Eghmazi, Ali
    Ataei, Mohammadhossein
    Landry, Rene, Jr.
    Chevrette, Guy
    [J]. IOT, 2024, 5 (01): : 20 - 34
  • [42] Data Aggregation for Privacy Protection of Data Streams Between Autonomous IoT Networks
    Neto, Renato Caminha Juacaba
    Merindol, Pascal
    Theoleyre, Fabrice
    [J]. 26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [43] Data Security and Privacy Challenges in Adopting Solutions For IOT
    Padaki, Sagar
    Supriya, S.
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2016, : 410 - 415
  • [44] Sensor-based IoT data privacy protection
    Xiaoyu Ji
    Wenjun Zhu
    Shilin Xiao
    Wenyuan Xu
    [J]. Nature Reviews Electrical Engineering, 2024, 1 (7): : 427 - 428
  • [45] Data Security & Privacy Protection in IoT MGC Systems
    Huijie, Robert Deng
    [J]. PROCEEDINGS OF THE 9TH ACM CYBER-PHYSICAL SYSTEM SECURITY WORKSHOP, CPSS 2023, 2023, : 1 - 1
  • [46] IoT Big Data Security and Privacy Versus Innovation
    Sollins, Karen R.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 1628 - 1635
  • [47] Privacy Preserving Data Access Scheme for IoT Devices
    Jahan, Mosarrat
    Seneviratne, Suranga
    Chu, Ben
    Seneviratne, Aruna
    Jha, Sanjay
    [J]. 2017 IEEE 16TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2017, : 217 - 226
  • [48] Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment
    Razaque, Abdul
    Rizvi, Syed S.
    [J]. COMPUTERS & SECURITY, 2016, 62 : 328 - 347
  • [49] To Share or Not to Share: On Location Privacy in IoT Sensor Data
    Papst, Franz
    Stricker, Naomi
    Entezari, Rahim
    Saukh, Olga
    [J]. 7TH ACM/IEEE CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2022), 2022, : 128 - 140
  • [50] The New Method of Sensor Data Privacy Protection for IoT
    Wu, Yue
    Song, Liangtu
    Liu, Lei
    [J]. SHOCK AND VIBRATION, 2021, 2021