Abstract
Trading data between user and service provider is a promising and efficient method to promote information exchange, service quality improvement, and development of emerging applications, benefiting individual and society. Meanwhile, data resale (i.e., data secondary use) is one of the most critical privacy issues hindering the ongoing process of data trading, which, unfortunately, is ignored in many of the existing privacy-preserving schemes. In this paper, we tackle the issue of data resale from a special angle, i.e., promoting cooperation between user and service provider to prevent data secondary use. For this purpose, we design a novel game-theoretical algorithm, in which user can unilaterally persuade service provider to cooperate in data trading, achieving a “win-win” situation. Besides, we validate our proposed algorithm performance through in-depth theoretical analysis and comprehensive simulations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Armstrong, S.: What happens to data gathered by health and wellness apps? Br. Med. J. (Online) 353 (2016)
Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. (2018, to appear)
Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. Trans. Netw. Sci. Eng. (2018, to appear)
Han, M., Li, L., Xie, Y., Wang, J., Duan, Z., Yan, M.: Cognitive approach for location privacy protection. IEEE Access (2018, to appear)
Hu, C., Li, R., Li, W., Yu, J., Cheng, X.: Efficient privacy-preserving dot-product computation in mobile computing. In: ACM Workshop on Privacy-Aware Mobile Computing (PAMCO), July 2016
Hu, C., Li, W., Cheng, X., Yu, J.: A secure and verifiable secret sharing scheme for big data storage. IEEE Trans. Big Data (2018, to appear)
IBM. https://www.ibm.com/analytics/us/en/technology/big-data/
Jin, R., He, X., Dai, H.: On the tradeoff between privacy and utility in collaborative intrusion detection systems-a game theoretical approach. In: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, pp. 45–51 (2017)
Krasnova, H., Günther, O., Spiekermann, S., Koroleva, K.: Privacy concerns and identity in online social networks. Identity Inf. Soc. 2(1), 39–63 (2009)
Li, W., Larson, M., Hu, C., Li, R., Cheng, X., Bie, R.: Secure multi-unit sealed first-price auction mechanisms. Secur. Commun. Netw. 9(16), 3833–3843 (2016)
Liang, Y., Cai, Z., Yu, J., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Mag. (2018, to appear)
Microsoft: Microsoft Azure: cloud computing platform and services. https://azure.microsoft.com/en-us/
Njilla, L.Y., Pissinou, N., Makki, K.: Game theoretic modeling of security and trust relationship in cyberspace. Int. J. Commun. Syst. 29(9), 1500–1512 (2016)
Osborne, M.J.: An Introduction to Game Theory, 1st edn. Oxford University Press, Oxford (2003)
Press, W.H., Dyson, F.J.: Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent. Proc. NAS 109(26), 10409–10413 (2012)
Shokri, R., Theodorakopoulos, G., Troncoso, C.: Privacy games along location traces: a game-theoretic framework for optimizing location privacy. ACM TOPS 19(4), 11 (2016)
National Environment Agency of Singapore: Singapore’s climate information and data. http://www.nea.gov.sg/weather-climate/climate/singapore’s-climate-information-data
TrustArc: 2016 TRUSTe/NCSA consumer privacy infographic - US Edition. https://www.truste.com/resources/privacy-research/ncsa-consumer-privacy-index-us/
Wang, W., Zhang, Q.: A stochastic game for privacy preserving context sensing on mobile phone. In: IEEE INFOCOM, Toronto, Canada, April 2014
Wang, W., Ying, L., Zhang, J.: A game-theoretic approach to quality control for collecting privacy-preserving data. In: IEEE Allerton. Allerton Park and Conference Center, USA, September 2015
Wang, X., Yang, Y., Tang, C., Zeng, Y., He, J.: DroidContext: identifying malicious mobile privacy leak using context. In: Proceedings of the IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 2016
Weibull, J.W.: Evolutionary Game Theory. MIT Press, Cambridge (1997)
Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM, Atlanta, USA, May 2017
Computer Science Zone: Security and the internet of things. http://www.computersciencezone.org/security-internet-of-things/
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Sooksatra, K., Li, W., Mei, B., Alrawais, A., Wang, S., Yu, J. (2018). Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy. In: Chellappan, S., Cheng, W., Li, W. (eds) Wireless Algorithms, Systems, and Applications. WASA 2018. Lecture Notes in Computer Science(), vol 10874. Springer, Cham. https://doi.org/10.1007/978-3-319-94268-1_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-94268-1_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-94267-4
Online ISBN: 978-3-319-94268-1
eBook Packages: Computer ScienceComputer Science (R0)