Privacy-preserved data trading via verifiable data disturbance

To motivate data owner (DO) to trade data, the existing data trading allows DO to sell the disturbed data to the data consumer (DC), where the disturbance parameter and the data price are negotiated by them, and DO independently adds the disturbance noise to data (usually continuous type) following...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG, Man, LI, Xinghua, REN, Yanbing, LUO, Bin, MIAO, Yinbin, LIU, Ximeng, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2024
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/9859
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-10859
record_format dspace
spelling sg-smu-ink.sis_research-108592024-12-24T02:24:02Z Privacy-preserved data trading via verifiable data disturbance ZHANG, Man LI, Xinghua REN, Yanbing LUO, Bin MIAO, Yinbin LIU, Ximeng DENG, Robert H. To motivate data owner (DO) to trade data, the existing data trading allows DO to sell the disturbed data to the data consumer (DC), where the disturbance parameter and the data price are negotiated by them, and DO independently adds the disturbance noise to data (usually continuous type) following the negotiation result. However, DOs may violate the negotiated parameter and add more noise to data while obtaining the negotiated price, which damages DC's disturbed data availability. This deficiency is rooted in the absence of supervision and verifiability on DOs’ independent disturbances. Aiming at the above problem, we devise a privacy-preserved data trading via verifiable data disturbance. Specifically, the honest-but-curious disturbance server (DS) is introduced to generate encrypted verifiable disturbance noises, and secretly distribute noises to DOs referring to the method of private information retrieval. Using homomorphic encryption, DOs finish data disturbance without knowing noises’ specific sizes. Subsequently, DC selects DOs to verify with our proposed anti-forgery verification, where the anti-forgery on both disturbance noise and original data guarantees verification correctness. Theoretical analysis proves that DOs’ original data is preserved in data trading. Extensive experiments using the real-world dataset demonstrate that our scheme can detect more than 80% of malicious DOs and decrease their utilities to punish malicious disturbance compared with existing works. 2024-08-01T07:00:00Z text https://ink.library.smu.edu.sg/sis_research/9859 info:doi/10.1109/TDSC.2023.3323669 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Privacy Differential Privacy Servers Games Pricing Public Key Nash Equilibrium Availability Requirement Data Trading Data Storage Systems Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Privacy
Differential Privacy
Servers
Games
Pricing
Public Key
Nash Equilibrium
Availability Requirement
Data Trading
Data Storage Systems
Information Security
spellingShingle Privacy
Differential Privacy
Servers
Games
Pricing
Public Key
Nash Equilibrium
Availability Requirement
Data Trading
Data Storage Systems
Information Security
ZHANG, Man
LI, Xinghua
REN, Yanbing
LUO, Bin
MIAO, Yinbin
LIU, Ximeng
DENG, Robert H.
Privacy-preserved data trading via verifiable data disturbance
description To motivate data owner (DO) to trade data, the existing data trading allows DO to sell the disturbed data to the data consumer (DC), where the disturbance parameter and the data price are negotiated by them, and DO independently adds the disturbance noise to data (usually continuous type) following the negotiation result. However, DOs may violate the negotiated parameter and add more noise to data while obtaining the negotiated price, which damages DC's disturbed data availability. This deficiency is rooted in the absence of supervision and verifiability on DOs’ independent disturbances. Aiming at the above problem, we devise a privacy-preserved data trading via verifiable data disturbance. Specifically, the honest-but-curious disturbance server (DS) is introduced to generate encrypted verifiable disturbance noises, and secretly distribute noises to DOs referring to the method of private information retrieval. Using homomorphic encryption, DOs finish data disturbance without knowing noises’ specific sizes. Subsequently, DC selects DOs to verify with our proposed anti-forgery verification, where the anti-forgery on both disturbance noise and original data guarantees verification correctness. Theoretical analysis proves that DOs’ original data is preserved in data trading. Extensive experiments using the real-world dataset demonstrate that our scheme can detect more than 80% of malicious DOs and decrease their utilities to punish malicious disturbance compared with existing works.
format text
author ZHANG, Man
LI, Xinghua
REN, Yanbing
LUO, Bin
MIAO, Yinbin
LIU, Ximeng
DENG, Robert H.
author_facet ZHANG, Man
LI, Xinghua
REN, Yanbing
LUO, Bin
MIAO, Yinbin
LIU, Ximeng
DENG, Robert H.
author_sort ZHANG, Man
title Privacy-preserved data trading via verifiable data disturbance
title_short Privacy-preserved data trading via verifiable data disturbance
title_full Privacy-preserved data trading via verifiable data disturbance
title_fullStr Privacy-preserved data trading via verifiable data disturbance
title_full_unstemmed Privacy-preserved data trading via verifiable data disturbance
title_sort privacy-preserved data trading via verifiable data disturbance
publisher Institutional Knowledge at Singapore Management University
publishDate 2024
url https://ink.library.smu.edu.sg/sis_research/9859
_version_ 1820027801628049408