[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2018)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 10874))

Abstract

Trading data between user and service provider is a promising and efficient method to promote information exchange, service quality improvement, and development of emerging applications, benefiting individual and society. Meanwhile, data resale (i.e., data secondary use) is one of the most critical privacy issues hindering the ongoing process of data trading, which, unfortunately, is ignored in many of the existing privacy-preserving schemes. In this paper, we tackle the issue of data resale from a special angle, i.e., promoting cooperation between user and service provider to prevent data secondary use. For this purpose, we design a novel game-theoretical algorithm, in which user can unilaterally persuade service provider to cooperate in data trading, achieving a “win-win” situation. Besides, we validate our proposed algorithm performance through in-depth theoretical analysis and comprehensive simulations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 87.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 109.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Armstrong, S.: What happens to data gathered by health and wellness apps? Br. Med. J. (Online) 353 (2016)

    Google Scholar 

  2. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. (2018, to appear)

    Google Scholar 

  3. Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. Trans. Netw. Sci. Eng. (2018, to appear)

    Google Scholar 

  4. Han, M., Li, L., Xie, Y., Wang, J., Duan, Z., Yan, M.: Cognitive approach for location privacy protection. IEEE Access (2018, to appear)

    Google Scholar 

  5. Hu, C., Li, R., Li, W., Yu, J., Cheng, X.: Efficient privacy-preserving dot-product computation in mobile computing. In: ACM Workshop on Privacy-Aware Mobile Computing (PAMCO), July 2016

    Google Scholar 

  6. Hu, C., Li, W., Cheng, X., Yu, J.: A secure and verifiable secret sharing scheme for big data storage. IEEE Trans. Big Data (2018, to appear)

    Google Scholar 

  7. IBM. https://www.ibm.com/analytics/us/en/technology/big-data/

  8. Jin, R., He, X., Dai, H.: On the tradeoff between privacy and utility in collaborative intrusion detection systems-a game theoretical approach. In: Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp, pp. 45–51 (2017)

    Google Scholar 

  9. Krasnova, H., Günther, O., Spiekermann, S., Koroleva, K.: Privacy concerns and identity in online social networks. Identity Inf. Soc. 2(1), 39–63 (2009)

    Article  Google Scholar 

  10. Li, W., Larson, M., Hu, C., Li, R., Cheng, X., Bie, R.: Secure multi-unit sealed first-price auction mechanisms. Secur. Commun. Netw. 9(16), 3833–3843 (2016)

    Article  Google Scholar 

  11. Liang, Y., Cai, Z., Yu, J., Li, Y.: Deep learning based inference of private information using embedded sensors in smart devices. IEEE Mag. (2018, to appear)

    Google Scholar 

  12. Microsoft: Microsoft Azure: cloud computing platform and services. https://azure.microsoft.com/en-us/

  13. Njilla, L.Y., Pissinou, N., Makki, K.: Game theoretic modeling of security and trust relationship in cyberspace. Int. J. Commun. Syst. 29(9), 1500–1512 (2016)

    Article  Google Scholar 

  14. Osborne, M.J.: An Introduction to Game Theory, 1st edn. Oxford University Press, Oxford (2003)

    Google Scholar 

  15. Press, W.H., Dyson, F.J.: Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent. Proc. NAS 109(26), 10409–10413 (2012)

    Article  Google Scholar 

  16. Shokri, R., Theodorakopoulos, G., Troncoso, C.: Privacy games along location traces: a game-theoretic framework for optimizing location privacy. ACM TOPS 19(4), 11 (2016)

    Google Scholar 

  17. National Environment Agency of Singapore: Singapore’s climate information and data. http://www.nea.gov.sg/weather-climate/climate/singapore’s-climate-information-data

  18. TrustArc: 2016 TRUSTe/NCSA consumer privacy infographic - US Edition. https://www.truste.com/resources/privacy-research/ncsa-consumer-privacy-index-us/

  19. Wang, W., Zhang, Q.: A stochastic game for privacy preserving context sensing on mobile phone. In: IEEE INFOCOM, Toronto, Canada, April 2014

    Google Scholar 

  20. Wang, W., Ying, L., Zhang, J.: A game-theoretic approach to quality control for collecting privacy-preserving data. In: IEEE Allerton. Allerton Park and Conference Center, USA, September 2015

    Google Scholar 

  21. Wang, X., Yang, Y., Tang, C., Zeng, Y., He, J.: DroidContext: identifying malicious mobile privacy leak using context. In: Proceedings of the IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, August 2016

    Google Scholar 

  22. Weibull, J.W.: Evolutionary Game Theory. MIT Press, Cambridge (1997)

    MATH  Google Scholar 

  23. Zheng, X., Cai, Z., Li, J., Gao, H.: Location-privacy-aware review publication mechanism for local business service systems. In: IEEE INFOCOM, Atlanta, USA, May 2017

    Google Scholar 

  24. Computer Science Zone: Security and the internet of things. http://www.computersciencezone.org/security-internet-of-things/

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Wei Li or Jiguo Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sooksatra, K., Li, W., Mei, B., Alrawais, A., Wang, S., Yu, J. (2018). Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy. In: Chellappan, S., Cheng, W., Li, W. (eds) Wireless Algorithms, Systems, and Applications. WASA 2018. Lecture Notes in Computer Science(), vol 10874. Springer, Cham. https://doi.org/10.1007/978-3-319-94268-1_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-94268-1_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-94267-4

  • Online ISBN: 978-3-319-94268-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics