Privacy-Preserved Data Disturbance and Truthfulness Verification for Data Trading

被引:1
|
作者
Zhang, Man [1 ]
Li, Xinghua [1 ,2 ]
Miao, Yinbin [1 ]
Luo, Bin [1 ]
Xu, Wanyun [1 ]
Ren, Yanbing [1 ]
Deng, Robert H. [3 ]
机构
[1] Xidian Univ, Sch Cyber Engn, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Minist Educ, Engn Res Ctr Big Data Secur, Xian 710071, Peoples R China
[3] Singapore Management Univ, Dept Informat Syst, Singapore 178902, Singapore
基金
中国国家自然科学基金;
关键词
Data trading; data privacy; purchase privacy; disturbance truthfulness; origin truthfulness;
D O I
10.1109/TIFS.2024.3402162
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advanced data trading allows data generator's (DG) disturbed data to be traded as both initial and reselling trading modes, which meets DG's raw data privacy and data consumers' (DCs) vast data requirement. However, the traded data truthfulness verifiability cannot be guaranteed in the privacy-preserved way. Firstly, due to DG's independent and random disturbance, DC cannot verify whether the traded data is disturbed under his required disturbance parameter without carrying privacy leakage on DG. Secondly, because the reselling trading is allowed, DC can hardly verify the traded data's origin truthfulness under the deceiving of data reseller (DR) while protecting his purchase privacy. Aiming at the above problems, we propose the privacy-preserved data disturbance and truthfulness verification for data trading. Specifically, an honest-but-curious trading server (TS) is introduced to assist our devised private-verifiable imprint-embedded disturbance method where imprint is blinding. Subsequently, TS implements the adaptive truthfulness verification by constructing imprint-embedded individual verification formula and requiring verified participants to decrypt the formula result. The verified participants cannot inform the blinding imprint value to forge the correct result, ensuring the accuracy of the devised verification method. Theoretical analysis proves that participants' privacy is preserved and the traded data's truthfulness can be guaranteed. Extensive experiments using the real-world dataset demonstrate that without any extra privacy cost, our scheme verifies 100% untruthful traded data compared with the existing solutions' 50%.
引用
收藏
页码:5545 / 5560
页数:16
相关论文
共 50 条
  • [41] PEX: Privacy-Preserved, Multi-Tier Exchange Framework for Cross Platform Virtual Assets Trading
    Sangpetch, Akkarit
    Sangpetch, Orathai
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [42] Estimating parameters for probabilistic linkage of privacy-preserved datasets
    Adrian P. Brown
    Sean M. Randall
    Anna M. Ferrante
    James B. Semmens
    James H. Boyd
    BMC Medical Research Methodology, 17
  • [43] Estimating parameters for probabilistic linkage of privacy-preserved datasets
    Brown, Adrian P.
    Randall, Sean M.
    Ferrante, Anna M.
    Semmens, James B.
    Boyd, James H.
    BMC MEDICAL RESEARCH METHODOLOGY, 2017, 17
  • [44] A Novel Blockchain-Based Privacy-Preserved Data Sharing Using Deep Maxout Network in Federated Learning
    Suganthi, S.
    Kala, T. Sree
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE AND APPLICATIONS, 2024, 23 (04)
  • [45] A privacy-preserved horizontal federated learning for malignant glioma tumour detection using distributed data-silos
    Sharma, Shagun
    Guleria, Kalpna
    Dogra, Ayush
    Gupta, Deepali
    Juneja, Sapna
    Kumari, Swati
    Nauman, Ali
    PLOS ONE, 2025, 20 (02):
  • [46] A Secure and Privacy-Preserved Road Condition Monitoring System
    Baruah, Barnana
    Dhal, Subhasish
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [47] Privacy-preserved community discovery in online social networks
    Zheng, Xu
    Cai, Zhipeng
    Luo, Guangchun
    Tian, Ling
    Bai, Xiao
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 1002 - 1009
  • [48] Minimal Information Loss for Privacy-Preserved eHealth Applications
    Chen, Ya-Ling
    Cheng, Bo-Chao
    Chen, Hsueh-lin
    Lin, Chia-, I
    Liao, Guo-Tan
    Hou, Bo-Yu
    Hsu, Shih-Chun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 185 - 190
  • [49] Privacy-Preserved Approximate Classification Based on Homomorphic Encryption
    Xiao, Xiaodong
    Wu, Ting
    Chen, Yuanfang
    Fan, Xingyue
    MATHEMATICAL AND COMPUTATIONAL APPLICATIONS, 2019, 24 (04)
  • [50] Privacy-Preserved Aggregate Thermal Dynamic Model of Buildings
    Hou, Zeyin
    Lu, Shuai
    Xu, Yijun
    Qiu, Haifeng
    Gu, Wei
    Dong, Zhao Yang
    Ding, Shixing
    IEEE TRANSACTIONS ON SMART GRID, 2024, 15 (06) : 5653 - 5664