Abstract
One of the emerging problems on the border of privacy protection research and e-commerce is the monetization of sensitive data. More precisely, a client would like to obtain some statistical data about users’ personal information in exchange for a reward. To satisfy both parties, a monetization protocol should ensure that users’ privacy is not violated and the data utility is preserved at the same time.
During ESORICS 2014 Bilogrevic et al. presented a novel and promising approach to monetization of aggregated sensitive data. In our paper, we point some flaws and shortcomings of the presented protocol. We also make some general methodological remarks to explain why some auspicious directions of data monetization might be futile. Finally, we propose a simple scheme for a secure data aggregation based on sharing trust between different non-collaborating parties.
Supported by Polish National Science Center DEC-2013/09/B/ST6/02251.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In some formulas for the sake of simplicity we identify a random variable with its distribution.
- 2.
Value k / n has similar influence on privacy as the parameter \(\gamma \) in [24].
References
U.s. census bureau. dataferrett analysis and extraction tool
Aperjis, C., Huberman, B.A.: A market for unbiased private data: Paying individuals according to their privacy attitudes. CoRR (2012)
Bilogrevic, I., Freudiger, J., De Cristofaro, E., Uzun, E.: What’s the Gist? privacy-preserving aggregation of user profiles. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part II. LNCS, vol. 8713, pp. 128–145. Springer, Heidelberg (2014)
Bilogrevic, I., Freudiger, J., Cristofaro, E.D., Uzun, E.: What’s the gist? privacy-preserving aggregation of user profiles. IACR Cryptology ePrint Archive, 2014:502 (2014)
Chan, T.-H.H., Shi, E., Song, D.: Privacy-Preserving Stream Aggregation with Fault Tolerance. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 200–214. Springer, Heidelberg (2012)
Chen, R., Reznichenko, A., Francis, P., Gehrke, J.: Towards statistical queries over distributed private user data. In: NSDI (2012)
Cynthia, D., Krishnaram, K., Frank, M., Ilya, M., Moni, N.: Our data, ourselves: Privacy via distributed noise generation. In: Proceedings of the 24th Annual International Conference on The Theory and Applications of Cryptographic Techniques (2006)
Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 1–12. Springer, Heidelberg (2006)
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265–284. Springer, Heidelberg (2006)
Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)
Fine, B., Rosenberger, G.: The Fundamental Theorem of Algebra. Springer, New York (1997)
Hu, L., Evens, D.: Secure aggregation for wireless networks. In: SAINT-W 2003 (2003)
Jose, J., Jose, J., Princy, M.: A survey on privacy preserving data aggregation protocols for wireless sensor networks. J. Comput. Inf. Technol. (2014)
Klonowski, M., Koza, M., Kutylowski, M.: Efficient and robust data aggregation using untrusted infrastructure. In: Elçi, A., Gaur, M.S., Orgun, M.A., Makarevich, O.B. (eds.) The 6th International Conference on Security of Information and Networks, SIN 2013, Aksaray, Turkey, November 26–28, pp. 123–130. ACM (2013)
Krishnamachari, B., Estrin, D., Wicker, S.B.: The impact of data aggregation in wireless sensor networks. In: 22nd International Conference on Distributed Computing Systems, Workshops (ICDCSW 2002) July 2–5, Vienna, Austria, Proceedings, pp. 575–578. IEEE Computer Society (2002)
Malheiros, M., Preibusch, S., Sasse, M.A.: “Fairly Truthful”: the impact of perceived effort, fairness, relevance, and sensitivity on personal data disclosure. In: Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds.) TRUST 2013. LNCS, vol. 7904, pp. 250–266. Springer, Heidelberg (2013)
Pablo, C.J., Christopher, R., Vijay, E., Mauro, C., de Oliveira, R.: Your browsing behavior for a big mac: Economics of personal information online. In: Proceedings of the 22Nd International Conference on World Wide Web, WWW 2013 (2013)
Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991)
Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010 (2010)
Riederer, C., Erramilli, V., Chaintreau, A., Krishnamurthy, B., Rodriguez, P.: For sale: Your data: By: You. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks (2011)
Rieffel, E.G., Biehl, J.T., van Melle, W., Lee, A.J.: Secured histories: computing group statistics on encrypted data while preserving individual privacy. CoRR, abs/1012.2152 (2010)
Roy, S., Conti, M., Setia, S., Jajodia, S.: Secure data aggregation in wireless sensor networks: Filtering out the attacker’s impact. IEEE Trans. Inf. Forensics Secur. 9(4), 681–694 (2014)
Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
Shi, E., Chan, T.-HH., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: NDSS (2011)
Tian, Y., Hankins, R.A., Patel, J.M.: Efficient aggregation for graph summarization. In: Wang, J.T. (ed.) Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD, Vancouver, BC, Canada, June 10–12, 2008, pp. 567–580. ACM (2008)
Acknowledgments
We would like to thank the anonymous referees for their very important comments and for providing directions for further work.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Piotrowska, A.M., Klonowski, M. (2016). Some Remarks and Ideas About Monetization of Sensitive Data. In: Garcia-Alfaro, J., Navarro-Arribas, G., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management, and Security Assurance. DPM QASA 2015 2015. Lecture Notes in Computer Science(), vol 9481. Springer, Cham. https://doi.org/10.1007/978-3-319-29883-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-29883-2_8
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-29882-5
Online ISBN: 978-3-319-29883-2
eBook Packages: Computer ScienceComputer Science (R0)