Skip to main content

Some Remarks and Ideas About Monetization of Sensitive Data

  • Conference paper
Book cover Data Privacy Management, and Security Assurance (DPM 2015, QASA 2015)

Abstract

One of the emerging problems on the border of privacy protection research and e-commerce is the monetization of sensitive data. More precisely, a client would like to obtain some statistical data about users’ personal information in exchange for a reward. To satisfy both parties, a monetization protocol should ensure that users’ privacy is not violated and the data utility is preserved at the same time.

During ESORICS 2014 Bilogrevic et al. presented a novel and promising approach to monetization of aggregated sensitive data. In our paper, we point some flaws and shortcomings of the presented protocol. We also make some general methodological remarks to explain why some auspicious directions of data monetization might be futile. Finally, we propose a simple scheme for a secure data aggregation based on sharing trust between different non-collaborating parties.

Supported by Polish National Science Center DEC-2013/09/B/ST6/02251.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In some formulas for the sake of simplicity we identify a random variable with its distribution.

  2. 2.

    Value k / n has similar influence on privacy as the parameter \(\gamma \) in [24].

References

  1. U.s. census bureau. dataferrett analysis and extraction tool

    Google Scholar 

  2. Aperjis, C., Huberman, B.A.: A market for unbiased private data: Paying individuals according to their privacy attitudes. CoRR (2012)

    Google Scholar 

  3. Bilogrevic, I., Freudiger, J., De Cristofaro, E., Uzun, E.: What’s the Gist? privacy-preserving aggregation of user profiles. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 128–145. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  4. Bilogrevic, I., Freudiger, J., Cristofaro, E.D., Uzun, E.: What’s the gist? privacy-preserving aggregation of user profiles. IACR Cryptology ePrint Archive, 2014:502 (2014)

    Google Scholar 

  5. Chan, T.-H.H., Shi, E., Song, D.: Privacy-Preserving Stream Aggregation with Fault Tolerance. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 200–214. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  6. Chen, R., Reznichenko, A., Francis, P., Gehrke, J.: Towards statistical queries over distributed private user data. In: NSDI (2012)

    Google Scholar 

  7. Cynthia, D., Krishnaram, K., Frank, M., Ilya, M., Moni, N.: Our data, ourselves: Privacy via distributed noise generation. In: Proceedings of the 24th Annual International Conference on The Theory and Applications of Cryptographic Techniques (2006)

    Google Scholar 

  8. Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)

    MathSciNet  MATH  Google Scholar 

  11. Fine, B., Rosenberger, G.: The Fundamental Theorem of Algebra. Springer, New York (1997)

    Book  Google Scholar 

  12. Hu, L., Evens, D.: Secure aggregation for wireless networks. In: SAINT-W 2003 (2003)

    Google Scholar 

  13. Jose, J., Jose, J., Princy, M.: A survey on privacy preserving data aggregation protocols for wireless sensor networks. J. Comput. Inf. Technol. (2014)

    Google Scholar 

  14. Klonowski, M., Koza, M., Kutylowski, M.: Efficient and robust data aggregation using untrusted infrastructure. In: Elçi, A., Gaur, M.S., Orgun, M.A., Makarevich, O.B. (eds.) The 6th International Conference on Security of Information and Networks, SIN 2013, Aksaray, Turkey, November 26–28, pp. 123–130. ACM (2013)

    Google Scholar 

  15. Krishnamachari, B., Estrin, D., Wicker, S.B.: The impact of data aggregation in wireless sensor networks. In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW 2002) July 2–5, Vienna, Austria, Proceedings, pp. 575–578. IEEE Computer Society (2002)

    Google Scholar 

  16. Malheiros, M., Preibusch, S., Sasse, M.A.: “Fairly Truthful”: the impact of perceived effort, fairness, relevance, and sensitivity on personal data disclosure. In: Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds.) TRUST 2013. LNCS, vol. 7904, pp. 250–266. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  17. Pablo, C.J., Christopher, R., Vijay, E., Mauro, C., de Oliveira, R.: Your browsing behavior for a big mac: Economics of personal information online. In: Proceedings of the 22Nd International Conference on World Wide Web, WWW 2013 (2013)

    Google Scholar 

  18. Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  19. Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010 (2010)

    Google Scholar 

  20. Riederer, C., Erramilli, V., Chaintreau, A., Krishnamurthy, B., Rodriguez, P.: For sale: Your data: By: You. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks (2011)

    Google Scholar 

  21. Rieffel, E.G., Biehl, J.T., van Melle, W., Lee, A.J.: Secured histories: computing group statistics on encrypted data while preserving individual privacy. CoRR, abs/1012.2152 (2010)

  22. Roy, S., Conti, M., Setia, S., Jajodia, S.: Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Trans. Inf. Forensics Secur. 9(4), 681–694 (2014)

    Article  Google Scholar 

  23. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  24. Shi, E., Chan, T.-HH., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: NDSS (2011)

    Google Scholar 

  25. Tian, Y., Hankins, R.A., Patel, J.M.: Efficient aggregation for graph summarization. In: Wang, J.T. (ed.) Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD, Vancouver, BC, Canada, June 10–12, 2008, pp. 567–580. ACM (2008)

    Google Scholar 

Download references

Acknowledgments

We would like to thank the anonymous referees for their very important comments and for providing directions for further work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marek Klonowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Piotrowska, A.M., Klonowski, M. (2016). Some Remarks and Ideas About Monetization of Sensitive Data. In: Garcia-Alfaro, J., Navarro-Arribas, G., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management, and Security Assurance. DPM QASA 2015 2015. Lecture Notes in Computer Science(), vol 9481. Springer, Cham. https://doi.org/10.1007/978-3-319-29883-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-29883-2_8

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-29882-5

  • Online ISBN: 978-3-319-29883-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics